Abstract
In this paper we compare two approaches for implementing Security and Privacy systems in Cyberspace: a structured approach, such as done in Mokum, where access is governed by structure (of the classes), and two principles: the epistemic and the ontologic principle. The second approach is based on the use of capabilities, such as provided by ERP systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dehne, F., R.P. van de Riet: A Guided Tour through Mokum 2.0, IR-368, Faculteit Wiskunde en Informatica, VU, October 1994.
Gendler-Fishman, Masha, Ehud Gudes: Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databases, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88–10
Gudes, Ehud, Reind van de Riet, Hans Burg, Martin Olivier: Alter-egos and Roles Supporting WorkFlow Security in Cyberspace, in:T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 152–166.
Hale, John, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88–103.
Olivier, M.S. E. Gudes, R.P. van de Riet, J.F.M. Burg: Specifying Application-lev el Security in Workflow Systems in: R. Wagner (Ed). Database and Expert Systems Applications, IEEE Computer Society, 1998, pp. 346–354.
Riet, R.P. van de, Beukering, J.: The Integration of Security and Integrity Constraints in MOKUM in: J. Biskup, M. Morgenstern, C. Landwehr (Eds), Proceedings of IFIP WG11.3 Working Conference on Database Security, IFIP/ North Holland, 1994,pp. 223–246.
Riet, R.P. van de, J.F.M. Burg, Modelling Alter Egos in Cyberspace: Who is Responsible? in: Proceedings WebNet96, San Francisco, AACE (Association for the Advancement of Computing in Education), Charlottesville, USA pp. 462–467, 1996.
Riet, R.P. van de, J.F.M. Burg, Modelling Alter Egos in Cyberspace: using a Work Flow management tool: who takes care of the Security and Privacy in: S. Lobodzinsky, I. Tomek (Eds)., Proceedings of WebNet97, Toronto, Association for the Advancement of Computing.
Rabitti, F., E. Bertino, W. Kim, D. Woelk: A Model of Authorization for nextgeneration database systems, ACM Transactions on Database Systems, Vol. 16, No. 1, pp. 88–131, 1991.
Radu, S., F. Dehne and R.P. van de Riet, A first step towards distributed Mokum, Technical Report 428, Computer Science Department, Vrije Universiteit, 1997.
Riet, R.P. van de, E. Gudes: An Object-Oriented Database Architecture for Providing High-Level Security in Cyberspace in: P. Samarati, R. Sandhu (Eds)., Proceedings of Tenth IFIP WG11.3 Working Conference on Database Security, Como 1996, pp. 92–115.
Riet, R.P. van de, Andrea Junk & E. Gudes: Security in Cyberspace: a Knowledge-base Approach, Data and Knowledge Engineering, Vol 24, Nr. 1, North Holland, 1997, pp. 69–98.
Riet, R.P. van de, W. Janssen, P. de Gruijter: Security moving from Database Systems to ERP Systems in: R. Wagner (Ed). Database and Expert Systems Applications, IEEE Computer Society, 1998, pp. 273–280.
Stonebraker, M., E. Wong, P. Kreps, G. Held: The Design and Implementation of INGRES, Transactions on Database Systems, ACM, Vol 1, Nr. 3. pp. 189–222., 1976.
Wouter Teepe, Reind van de Riet, Martin Olivier: WorkFlow Analyzed for Security and Privacy in using Databases; submitted for publication. 2000.
Varadharajan, V. Distributed Object System Security, Information Security-the next Decade, Edited by H.P Eloff and S. H. von Solms, Chapman & Hall, 1995, pp. 305–321.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
van de Riet, R., Janssen, W., Olivier, M., Serban, R. (2000). A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. In: Ibrahim, M., Küng, J., Revell, N. (eds) Database and Expert Systems Applications. DEXA 2000. Lecture Notes in Computer Science, vol 1873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44469-6_27
Download citation
DOI: https://doi.org/10.1007/3-540-44469-6_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67978-3
Online ISBN: 978-3-540-44469-5
eBook Packages: Springer Book Archive