A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases

نویسندگان

  • Ahmad Baraani-Dastjerdi
  • Janusz R. Getta
  • Josef Pieprzyk
  • Reihaneh Safavi-Naini
چکیده

A new approach to the discretionary access control in structurally object-oriented databases is suggested. The approach is based on the use of pseudo-random functions and sibling intractable functions, rather than on the traditional access control list associated with each class. The advantage of this approach is that each class in the hierarchy of a complex object class can be associated with one access key such that it can be directly accessed by its ancestor without the need to pass through any intermediate classes. The security of the model depends on the diiculty of predicting the output of pseudo-random functions and on nding extra sibling collision for the sibling intractable function family.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases

This is a discussion paper which presents a cryptographic solution for discretionary access control in object-oriented databases. Our approach is based on the use of pseudo-random functions and sibling intractable function families (SIFF). Each entity (object or class) in the object-oriented database model is associated with access keys that ensure secure access to that entity and all related e...

متن کامل

Discretionary Access Control in Object-oriented Databases: Issues and Research Directions

In recent years we have witnessed considerable e orts in the research and development of object-oriented database management systems. As object-oriented database technology matures, the availability of adequate access control mechanisms will be crucial to its commercial acceptance. In this paper we discuss discretionary access control issues in object-oriented databases. Our objective is two-fo...

متن کامل

Accesscontrol in Object - Oriented Databases : Issues and Research

In recent years we have witnessed considerable eeorts in the research and development of object-oriented database management systems. As object-oriented database technology matures, the availability of adequate access control mechanisms will be crucial to its commercial acceptance. In this paper we discuss discretionary access control issues in object-oriented databases. Our objective is twofol...

متن کامل

Enhancing Cim Environments by Security Control

Computer Integrated Manufacturing (CIM) applications require a different database functionality than applications in more traditional areas. Due to the growing importance of CIM, advanced database systems and data models have been developed to meet the CIM specific requirements. However, none of these approaches considers to include the security control in CIM databases. In this paper we identi...

متن کامل

Authorization and Access Control in IRO-DB

*) This work is supported by European ESPRIT III, project Nr. 8629. Abstract The paper describes authorization and access control in the IRO-DB database system, a system supporting interoperable access between relational and object-oriented databases. The security policy developed is a federated, administrative discretionary access control policy which supports positive, negative, as well as im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995