skip to main content
article
Free Access

A model of authorization for next-generation database systems

Published:01 March 1991Publication History
Skip Abstract Section

Abstract

The conventional models of authorization have been designed for database systems supporting the hierarchical, network, and relational models of data. However, these models are not adequate for next-generation database systems that support richer data models that include object-oriented concepts and semantic data modeling concepts. Rabitti, Woelk, and Kim [14] presented a preliminary model of authorization for use as the basis of an authorization mechanism in such database systems. In this paper we present a fuller model of authorization that fills a few major gaps that the conventional models of authorization cannot fill for next-generation database systems. We also further formalize the notion of implicit authorization and refine the application of the notion of implicit authorization to object-oriented and semantic modeling concepts. We also describe a user interface for using the model of authorization and consider key issues in implementing the authorization model.

References

  1. 1 BANERJEE, J., CHOU, H. T., GA~Z^, J., KrM, W., WOELK, D., BALLOU, N., AND KIM, H. J. Data model issues for object-oriented applications. ACM Trans. Off. Inf. Sys. 5, 1 (Apr. 1987) 3-26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 CHOU, H. T., AND KIM, W. A framework for versions in a CAD environment. In Proceedings of the 12th International Conference on Very Large Data Bases (Kyoto, Japan, Aug.). 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 C~ou, H. T., AND KIM, W. Versions and change notification in an object-oriented database system. In Proceedings of the Design Automation Conference (June). 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 DATE, C.J. A Guide to DB2. Addison-Wesley, Reading, Mass., 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5 FERNANDEZ, E. B., SUMMERS, R. C., AND COLEMAN, C. D. An authorization model for a shared database. In Proceedings of the 1975 ACM-SIGMOD Internatwnal Conference. ACM, New York, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 FERNANDEZ, E. B., SUMMERS, R. C., AND LANG, T. Definition and evaluation of access rules in data management systems. In Proceedings of the 1st International Conference on Very Large Data Bases (Boston, Mass.). 1975.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7 FERNANDEZ, E. B., SUMMERS, R .C., ANn WOOD, C. Database security and integrity. Addison-Wesley, Reading, Mass., 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 GRAHAM, G. S., AND DENNING, P.J. Protection: Principles and practice. In AFIPS Conference Proceedings 40, 1972 SJCC. AFIPS Press, Montvale, N.J., 1972, pp. 417-429.Google ScholarGoogle Scholar
  9. 9 GRIFFITHS, P. P., AND WADE, B.W. An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1, 3 (Sept. 1976), 242-255. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 KIM, W., BERTINO, E., AND GARZA, J. Composite objects revisited. In Proceedings of the ACM-SIGMOD International Conference (Portland, Oreg., June). ACM, New York, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 KrM, W., BANERJEE, J., CHOU, H. T., GARZA, J., AND WOELK, D. Composite object support in an object-oriented database system. In Proceedings of the 2d International Conference on Object-Ortented Programming Systems, Languages, and Apphcations (Orlando, Fla., Oct.). 1987, 118-125. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12 KIM, W., BALLOU, N., CHou, H. T., GARZA, J., WOELK, D., AND BANERJEE, J. Integrating an object-oriented programming system with a database system. In Proceedings of the 3rd International Conference on Object-Oriented Programming Systems, Languages, and Applications (San Diego, Calif., Sept.). 1988, 142-152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13 LAMPSON, B. W. Protection. In Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems. 1971.Google ScholarGoogle Scholar
  14. 14 RABITTI, F., WOELK, D., AND KrM, W. A model of authorization for object-oriented and semantic databases. In Proceedings of the International Conference on Extending Database Technology (Venice, Italy, Mar.). 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 T~URAISINGHAM, M. B. Mandatory and discretionary security issues in object-oriented database systems. In Proceedings of the 4th International Conference on Object-Oriented Programming Systems, Languages, and Applications (New Orleans, La., Oct.). 1989, 203-210. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A model of authorization for next-generation database systems

          Recommendations

          Reviews

          Jane B. Grimson

          The authors present an authorization model designed for post-relational database management systems (DBMSs) that are based on object-oriented or semantic data models. They argue that conventional approaches to authorization , based on the tuple and relation, are not suitable for the richer data models of the next generation of DBMSs. The model proposed represents a refinement and extension of the one presented previously by Rabitti et al. [1]. It has three dimensions—subjects (user or user groups), types (read, update, and create), and data objects themselves. Authorization rules have three attributes—they are implicit or explicit, positive or negative, and strong or weak—which provide the basis on which to build a powerful and flexible authorization mechanism. Explicit rules are those that are explicitly stated and physically stored, for example, to give a user read permission on a particular data object. Implicit rules, by contrast, are not stored in the system, but are deduced from explicit rules. The use of implicit rules incurs a processing overhead in that they have to be deduced, but their use can represent a substantial saving of storage over explicit storage of all rules. Implicit rules are probably even more important and natural in the inheritance-based object-oriented model than in conventional relational, network, and hierarchical models. Positive rules are used to grant permissions, while negative rules deny permissions. The third attribute of an authorization rule, which specifies whether it is weak or strong, is also particularly useful in inheritance-based models, since it provides a mechanism for overriding rules inherited from elsewhere. Weak rules can be overridden, whereas strong rules cannot. The authors have formalized their authorization model, which is essential in light of the complexities involved with strong versus weak and implicit versus explicit rules in the context of inheritance. For example, it helps to highlight possible conflicts arising from multiple inheritance. The paper is clearly written and well illustrated with examples. It tackles an area of DBMS research, namely security, that is of great interest to DBMS users but may be somewhat neglected in the database research community. The present model does not support content- or context-dependent authorization, although the implication at the end of the paper is that the authors intend to look at these issues.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Database Systems
            ACM Transactions on Database Systems  Volume 16, Issue 1
            March 1991
            205 pages
            ISSN:0362-5915
            EISSN:1557-4644
            DOI:10.1145/103140
            Issue’s Table of Contents

            Copyright © 1991 ACM

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 March 1991
            Published in tods Volume 16, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader