Authorization analysis of queries in object-oriented databases | SpringerLink
Skip to main content

Authorization analysis of queries in object-oriented databases

  • Authorization and Views
  • Conference paper
  • First Online:
Deductive and Object-Oriented Databases (DOOD 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1013))

Included in the following conference series:

Abstract

A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorizations. As an underlying model of method execution, we adopt the model proposed by Hull et al.; a database schema consists of a class hierarchy, attribute declarations and method definitions. A method body is simply a sequence of statements. There are three types of statements: an access to an attribute of the self object, a method invocation, and a built-in operation on basic values. Authorizations are represented as a pair of finite sets: AUTH =〈AUTH m,AUTH s〉, AUTH m={(c1, m1, c′1, m′1), (c2, m2, c′2, m′2),..., (cl, ml, c′l, m′l)}, AUTHs= {(s1, c1, m1), (s2, c2, m2),..., (sn, cn, mn)} where s i is a subject (user, process), c i, c′i are classes and m i, m′i are method names. Given a database schema S, a subject s and a set of authorizations AUTH, we say that (S, s) is valid with respect to AUTH, if, whenever a method m invoked by s on an object of a class c is directly invoking a method m′ on an object of a class c′, (s, c′, m′) belongs to AUTH s or (c, m, c′,m′) belongs to AUTH m. In this paper we show that if one of the following conditions holds, then it can be decided in polynomial time whether (S, s) is valid with respect to AUTH.

  1. 1.

    S is a retrieval schema, that is, does not contain any statement which updates an attribute.

  2. 2.

    S is a non-branching update schema, which permits updates in a restricted way, and a database instance is acyclic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. S. Abiteboul, P. C. Kanellakis and E. Waller: “Method Schemas,” Proc. 9th ACM Symposium on Principles of Database Systems, pp. 16–27, 1990.

    Google Scholar 

  2. R. Ahad, J. Davis, S. Gower, P. Lyngbaek, A. Marynowski and E. Onuegbe: “Supporting Access Control in an Object-Oriented Database Language,” Proc. 3rd Int'l Conf. on Extending Database Technology, Lecture Notes in Computer Science 580, pp. 184–200, 1992.

    Google Scholar 

  3. E. Bertino: “Data Hiding and Security in Object-Oriented Databases,” Proc. 8th IEEE Int'l Conf. on Data Engineering, pp. 338–247, Feb. 1992.

    Google Scholar 

  4. E. Bertino, S. Jajodia and P. Samarati: “Access Controls in Object-Oriented Database Systems — Some Approaches and Issues,” Advanced Database Systems, Chapter 2, Lecture Notes in Computer Science 759, pp. 17–44, 1993.

    Google Scholar 

  5. E. Bertino and P. Samarati: “Research Issues in Discretionary Authorizations for Object Bases,” Proc. OOPSLA-93 Conference Workshop on Security for Object-Oriented systems, pp. 183–199, 1994.

    Google Scholar 

  6. E. Bertino and H. Weigand: “An Approach to Authorization Modeling in Object-Oriented Database Systems, ” Data and Knowledge Engineering, 12, pp. 1–29, 1994.

    Google Scholar 

  7. E. B. Fernandez, M. M. Larrondo-Petrie and E. Gudes: “A Method-Based Authorization Model for Object-Oriented Databases,” Proc. OOPSLA-93 Conference Worhshop on Security for Object-Oriented Systems, Springer-Verlag, pp. 135–150, 1994.

    Google Scholar 

  8. R. Hull, K. Tanaka and M. Yoshikawa: “Behavior Analysis of Object-Oriented Databases: Method Structure, Execution Trees, and Reachability,” Proc. 3rd Int'l Conf. on Foundations of Data Organization and Algorithms, pp. 372–388, June 1989.

    Google Scholar 

  9. H. Izuno: “Authorization Analysis of Queries in Object-Oriented Databases,” Master's Thesis, NAIST-IS-MT351008, Graduate School of Information Science, Nara Institute of Science and Technology, Feb. 1995.

    Google Scholar 

  10. J. Palsberg and M. I. Schwartzbach: “Object-Oriented Type Systems,” John Wiley & Sons, 1994.

    Google Scholar 

  11. H. Seki, Y. Ishihara and H. Dodo: “Testing Type Consistency of Method Schemas,” submitted to an international conference.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tok Wang Ling Alberto O. Mendelzon Laurent Vieille

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Seki, H., Ishihara, Y., Ito, M. (1995). Authorization analysis of queries in object-oriented databases. In: Ling, T.W., Mendelzon, A.O., Vieille, L. (eds) Deductive and Object-Oriented Databases. DOOD 1995. Lecture Notes in Computer Science, vol 1013. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60608-4_59

Download citation

  • DOI: https://doi.org/10.1007/3-540-60608-4_59

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60608-6

  • Online ISBN: 978-3-540-48460-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics