Implicit Authorization Mechanism of Object-Oriented Database

Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.


Authors:



References:
[1] Oki Y, Chikaraishi T, Shimomura T and Ohta T. A design method for
data integrity in object-oriented database systems. International
Conference on Information Engineering, Proceedings of IEEE Singapore,
1995: 204-209.
[2] Ambhore, Premchand B, Meshram B, and Waghmare V B. An
implementation of object-oriented database security. Software
Engineering Research, Management & Applications, 2007. SERA 2007.
5th ACIS International Conference, 2007:359-365.
[3] Fernandez E B, Gudes E, and Hauyan Song. A model for evaluation and
administration of security in object-oriented database systems.
Knowledge and Data Engineering, IEEE Transactions on Vol. 6, Issue 2,
April 1994: 275-292.
[4] Bertino E, Bettini C, Ferrari E and Samarati P. A temporal access control
mechanism for database systems (J). Knowledge and Data Engineering,
IEEE Transactions on Vol. 8, Issue 1, February. 1996: 67-80.
[5] Demurjian SA, Hu M Y, Ting T C and Kleinman D. Towards an
Authorizaiton Mechanism for User-Role Based Security in an
Object-Oriented Design model(C). Computer and Communications,
1993, 12th Annual International Phoenix Conference on, March
1993:195-202.
[6] Thomas R K, Sandhu R S. A Trusted Subject Architecture for Multilevel
Secure Object-oriented Database (J). Knowledge and Data Engineering,
IEEE Transactions on Vol. 8, Issue 1, Feb. 1996: 16-31.
[7] Bertino E, Jajodia S and Samarati P. Supporting multiple access policies
in database systems(C). Security and Privacy, 1996. Proceedings, 1996
IEEE Symposium on May1996: 94-107.
[8] Xu Jiepan, Object Oriented Database and Applications. Beijing: Science
Press, 2003:78-95.
[9] Ni Xianjun. A logic specification and implementation approach for
object-oriented database security. Knowledge Discovery and Data
Mining, 2008. WKDD 2008. International Workshop, 2008: 461-464.
[10] Zhou Deyu, Luobin, Chen Shifu, Security Model for Object-Oriented
Database Systems and its Application. Computer Engineering and
Applications. 2003.27:210-212.
[11] Wang Yijie, Object Oriented Database. Beijing: Electronic Industry Press,
2003:253-267.
[12] Zhang Min, Xu Zhen, Feng Dengguo, Database Security. Beijing:
Science Press, 2005: 140-146.
[13] Chen Qiang. The Problem About the Safe Protection of Object-oriented
Database. Computer Engineering Vol. 24, No.6, 1994:41-43.
[14] Milen J K, Lunt T F. Security for object-oriented database systems.
Research in Security and Privacy, 1992. Proceedings, 1992 IEEE
Computer Society Symposium on May. 1992: 260-272.
[15] Zhang C N, Honglan Zhong. An Integrated approach for database security
and fault tolerance. Information Technology: Coding and Computing,
2004. Proceedings. ITCC 2004. International Conference on Vol. 1,
2004: 762-766.