skip to main content
10.1145/800191.805538acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-national-conferenceConference Proceedingsconference-collections
Article
Free Access

Full protection specifications in the semantic model for database protection languages

Authors Info & Claims
Published:20 October 1976Publication History

ABSTRACT

The basic model of semantics for protection languages is reviewed. Advanced protection features are introduced into the model and their impact on authorization and enforcement is discussed. History keeping allows access dependency upon the occurrence of previous data operations. Auxiliary program invocation provides for additional (procedural) protection measures. Extended authorization permits a user to utilize, via authorized procedures, data which are not directly accessible by him. Examples are used to explain each of these features. The enforcement process for full specifications is illustrated with an example.

References

  1. 1.R.F. Boyce, et al., Specifying queries as relational expressions, ACM-SIGPLAN Notices, vol.10, no. 1, January 1975.Google ScholarGoogle Scholar
  2. 2.CODASYL Database Task Group, Report to the Programming Language Committee, rev. April 1971.Google ScholarGoogle Scholar
  3. 3.Arthur Evans Jr., et al., A user authentication scheme not requiring secrecy in the computer, Communications of the ACM, vol. 17, no. 8, August 1974, 437-442. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.Donald I. Good, Provable programming, Proceedings of the International Conference on Reliable Software, printed in ACM-SIGPLAN Notices, vol. 10, no. 6, June 1975, 411-419. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.H. Rex Hartson and David K. Hsiao, A semantic model for database protection languages, Proceedings of the Second International Conference on Very Large Database, North Holland Publishing Co., Brussels, Belgium, September 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.Lance J. Hoffman, The formulary model for flexible privacy and access control, Proceedings FJCC, vol. 39, 1971, 587-601.Google ScholarGoogle Scholar
  7. 7.L. J. Hoffman and William F. Miller, Getting a personal dossier from a statistical data bank, reprinted in Security and Privacy in Computer Systems, Melville Pub. Co., Los Angeles, 1973, 289-293.Google ScholarGoogle Scholar
  8. 8.Anita K. Jones, Protection in programmed systems, Ph.D. Dissertation, Department of Computer Science, Carnegie-Mellon University, June 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Butler W. Lampson, A note on the confinement problem, Communications of the ACM, vol. 16, no. 10, October 1973, 613-615. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.H. E. Petersen and R. Turn, System implications on information privacy, Proceedings of SJCC, vol. 30, 1967, 291-300.Google ScholarGoogle Scholar
  11. 11.Gerald J. Popek and Charles S. Kline, A verifiable protection system, Proceedings of the International Conference on Reliable Software, printed in ACM-SIGPLAN Notices, vol. 10, no. 6, June 1975, 294-304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.George B. Purdy, A high security log-in procedure, Communications of the ACM, vol. 17, no.8, August 1974, 442-445. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Full protection specifications in the semantic model for database protection languages

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ACM '76: Proceedings of the 1976 annual conference
          October 1976
          576 pages
          ISBN:9781450374897
          DOI:10.1145/800191

          Copyright © 1976 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 20 October 1976

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader