Sciweavers

Share
DOOD
1995
Springer

Authorization Analysis of Queries in Object-Oriented Databases

8 years 12 months ago
Authorization Analysis of Queries in Object-Oriented Databases
Abstract. A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorizations. As an underlying model of method execution, we adopt the model proposed by Hull et al.; a database schema consists of a class hierarchy, attribute declarations and method definitions. A method body is simply a sequence of statements. There are three types of statements: an access to an attribute of the self object, a method invocation, and a built-in operation on basic values. Authorizations are represented as a pair of finite sets: AUTH = ¢ AUTHm £ AUTHs ¤ , AUTHm =   (¥ 1 £§¦ 1 £ ¥©¨1 £¦ ¨1)£ (¥ 2 £§¦ 2 £ ¥¨2 £¦ ¨2)£ . . . £ (¥© £¦  £ ¥¨ £¦ ¨ )¡ , AUTHs =  ( 1 £ ¥ 1 £§¦ 1)£ ( 2 £ ¥ 2 £¦ 2)£ . . . £ (© £ ¥ £§¦  )¡ where © is a subject (user, process), ¥  , ¥ ¨ are classes and ¦  , ¦ ¨ are method names. Given a data...
Hiroyuki Seki, Yasunori Ishihara, Minoru Ito
Added 26 Aug 2010
Updated 26 Aug 2010
Type Conference
Year 1995
Where DOOD
Authors Hiroyuki Seki, Yasunori Ishihara, Minoru Ito
Comments (0)
books