期刊文献+

面向对象数据库的隐授权安全机制研究 被引量:3

Research on implicit authorization mechanism of object-oriented database
下载PDF
导出
摘要 面向对象数据库(OODB)独特的数据组织与操纵原理,决定了其具有不同于传统关系数据库的安全保护和授权模式。介绍了OODB安全授权机制特点,通过对OODB安全授权模式的主体、客体及访问方式三个层次的讨论,重点对授权检验流程及这三个层次上的隐授权机制进行了研究,通过尝试在实例中结合其他几种授权方式的应用,表明了隐授权机制的有效性和灵活性。 Due to the special principle of data structure and manipulate principle,OODB has a particular safe protection and authorization methods.This paper first introduces the feature of security mechanism of OODB,and then based on the discussion on subject hierarchy,object hierarchy and operation hierarchy to focus on the authorization check process and authorization mechanism of OODB.By implement an instance combined with other authorization methods to validate the improvement of flexibility of implicit authorization mechanism.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第2期121-124,144,共5页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)(No.2007AA01Z445)~~
关键词 面向对象数据库 安全保护 授权机制 隐授权 授权检验 Object-Oriented Database(OODB) safe protection authorization mechanism implicit authorization authorization check
  • 相关文献

参考文献13

  • 1Oki Y,Chikaraishi T,Shimomura T,et al.A design method for data integrity in object--oriented database systems[C]//Proceedings of IEEE International Conference on Information Engineering,Singapore,1995: 204-209.
  • 2Ambhore P B,Meshram B B,Wachmare V B.An implementation of object-oriented database security[C]//Sth ACIS International Conference on Software Engineering Research,Management & Applications,2007, SERA 2007,2007: 359-365.
  • 3Fernandez E B,Gudes E,Song HA model for evaluation and administration of security in object-oriented database systems[J].IEEE Transactions on Knowledge and Data Engineering, 1994,6(2) :275-292.
  • 4Bertion E,Bettini C,Ferrari E,et al.A temporal access control mechanism for database systems[S].IEEE Transactions on Knowledge and Data Engineering, 1996,8(1) : 67-80.
  • 5Demurjian S A,Hu M Y,Ting T C,et al.Towards an anthorizaiton mechanism for user-role based security in an object-oriented design model[C]//12th Annual International Phoenix Conference on Computer and Communications 1993,1993 : 195-202.
  • 6Thomas R K,Sandhu R S.A trusted subject architecture for multilevel secure object-oriented database[J],IEEE Transactions on Knowledge and Data Engineering, 1996:16-31.
  • 7Bertion E,Jajodia S,Samarati P.Supporting multiple access policies in database systems[C]//Procecdings 1996 IEEE Symposium on Security and Privacy,May 1996:94-107.
  • 8冯铃,冯玉才.面向对象数据库系统安全机制的研究[J].软件,1994,15(10):1-6. 被引量:1
  • 9陈强.面向对象数据库的安全保护问题[J].计算机工程,1998,24(6):41-43. 被引量:3
  • 10周德宇,骆斌,陈世福.面向对象数据库的安全模型及其应用[J].计算机工程与应用,2003,39(27):210-212. 被引量:1

二级参考文献8

  • 1李昭原,邓昳.面向对象数据库技术及其最新动态[J].微电脑世界,1996(4):20-25. 被引量:6
  • 2S Abiteboul,A Bonner.Ojects and Views[C].In:Proceedings of the 1991 ACM SINMOD international conference on Management of Data,1991: 238-247.
  • 3A Baraani-Dastjerdi,J Pieprzyk,R Safavi-Naini.A security Model for Multilevel object-oriented databases based on views.
  • 4R K Thomas,R S Sandhu.Implementing the Message fdter objectoriented security model without trusted subject[C].In:Proc Of the IFIP WG11.3 Workshop on Database security,Vancouver,Canada.
  • 5MARTIN S OLIVIER,SEBASTIAN H VON SOLMS.A Taxonomy for Object-Oriented Secure Databases[J].ACM Transactions on Database Systems, 1994; 19( 1 ).
  • 6S Jajodia,B Kogan.Integrating an object-oriented data model with multi-level security[C].In:Proc of the 1990 IEEE Symposium on Security and Privacy,1990-05:76--85.
  • 7R S Sandhu,R Thomas,S Jajodia.A Secure Kernelized Architecture for Multilevel Object-Oriented Databases[C].In:Proc of the IEEE Computer Security Foundations WorkshopIV,1991-06:139-152.
  • 8蒋韬,李信满,刘积仁.信息安全模型研究[J].小型微型计算机系统,2000,21(10):1078-1081. 被引量:25

共引文献2

同被引文献12

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部