Abstract
A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorizations. As an underlying model of method execution, we adopt the model proposed by Hull et al.; a database schema consists of a class hierarchy, attribute declarations and method definitions. A method body is simply a sequence of statements. There are three types of statements: an access to an attribute of the self object, a method invocation, and a built-in operation on basic values. Authorizations are represented as a pair of finite sets: AUTH =〈AUTH m,AUTH s〉, AUTH m={(c1, m1, c′1, m′1), (c2, m2, c′2, m′2),..., (cl, ml, c′l, m′l)}, AUTHs= {(s1, c1, m1), (s2, c2, m2),..., (sn, cn, mn)} where s i is a subject (user, process), c i, c′i are classes and m i, m′i are method names. Given a database schema S, a subject s and a set of authorizations AUTH, we say that (S, s) is valid with respect to AUTH, if, whenever a method m invoked by s on an object of a class c is directly invoking a method m′ on an object of a class c′, (s, c′, m′) belongs to AUTH s or (c, m, c′,m′) belongs to AUTH m. In this paper we show that if one of the following conditions holds, then it can be decided in polynomial time whether (S, s) is valid with respect to AUTH.
-
1.
S is a retrieval schema, that is, does not contain any statement which updates an attribute.
-
2.
S is a non-branching update schema, which permits updates in a restricted way, and a database instance is acyclic.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Abiteboul, P. C. Kanellakis and E. Waller: “Method Schemas,” Proc. 9th ACM Symposium on Principles of Database Systems, pp. 16–27, 1990.
R. Ahad, J. Davis, S. Gower, P. Lyngbaek, A. Marynowski and E. Onuegbe: “Supporting Access Control in an Object-Oriented Database Language,” Proc. 3rd Int'l Conf. on Extending Database Technology, Lecture Notes in Computer Science 580, pp. 184–200, 1992.
E. Bertino: “Data Hiding and Security in Object-Oriented Databases,” Proc. 8th IEEE Int'l Conf. on Data Engineering, pp. 338–247, Feb. 1992.
E. Bertino, S. Jajodia and P. Samarati: “Access Controls in Object-Oriented Database Systems — Some Approaches and Issues,” Advanced Database Systems, Chapter 2, Lecture Notes in Computer Science 759, pp. 17–44, 1993.
E. Bertino and P. Samarati: “Research Issues in Discretionary Authorizations for Object Bases,” Proc. OOPSLA-93 Conference Workshop on Security for Object-Oriented systems, pp. 183–199, 1994.
E. Bertino and H. Weigand: “An Approach to Authorization Modeling in Object-Oriented Database Systems, ” Data and Knowledge Engineering, 12, pp. 1–29, 1994.
E. B. Fernandez, M. M. Larrondo-Petrie and E. Gudes: “A Method-Based Authorization Model for Object-Oriented Databases,” Proc. OOPSLA-93 Conference Worhshop on Security for Object-Oriented Systems, Springer-Verlag, pp. 135–150, 1994.
R. Hull, K. Tanaka and M. Yoshikawa: “Behavior Analysis of Object-Oriented Databases: Method Structure, Execution Trees, and Reachability,” Proc. 3rd Int'l Conf. on Foundations of Data Organization and Algorithms, pp. 372–388, June 1989.
H. Izuno: “Authorization Analysis of Queries in Object-Oriented Databases,” Master's Thesis, NAIST-IS-MT351008, Graduate School of Information Science, Nara Institute of Science and Technology, Feb. 1995.
J. Palsberg and M. I. Schwartzbach: “Object-Oriented Type Systems,” John Wiley & Sons, 1994.
H. Seki, Y. Ishihara and H. Dodo: “Testing Type Consistency of Method Schemas,” submitted to an international conference.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seki, H., Ishihara, Y., Ito, M. (1995). Authorization analysis of queries in object-oriented databases. In: Ling, T.W., Mendelzon, A.O., Vieille, L. (eds) Deductive and Object-Oriented Databases. DOOD 1995. Lecture Notes in Computer Science, vol 1013. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60608-4_59
Download citation
DOI: https://doi.org/10.1007/3-540-60608-4_59
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60608-6
Online ISBN: 978-3-540-48460-8
eBook Packages: Springer Book Archive