{"title":"Discretionary access controls in a high-performance object management system","authors":"U. Kelter","doi":"10.1109/RISP.1991.130796","DOIUrl":null,"url":null,"abstract":"A method for efficiently implementing access control lists (ACLs) in the main memory object-oriented database systems (OODBSs) is proposed. The main features of the method are the following: ACLs are not stored directly, but via ACL numbers; and each process has a cache which records results of evaluations of ACLs for this process and certain ACL numbers. The particular implementation of ACL numbers in the High-Performance Portable Common Tool Environment (H-PCTE) is considered, and a set of measures which speed up access controls in the most time-critical data manipulation operations is presented. The author then compares the proposed method with other approaches, and discusses whether and how the proposed method can be used to implement ACLs in a disc-oriented system.<<ETX>>","PeriodicalId":445112,"journal":{"name":"Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RISP.1991.130796","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
A method for efficiently implementing access control lists (ACLs) in the main memory object-oriented database systems (OODBSs) is proposed. The main features of the method are the following: ACLs are not stored directly, but via ACL numbers; and each process has a cache which records results of evaluations of ACLs for this process and certain ACL numbers. The particular implementation of ACL numbers in the High-Performance Portable Common Tool Environment (H-PCTE) is considered, and a set of measures which speed up access controls in the most time-critical data manipulation operations is presented. The author then compares the proposed method with other approaches, and discusses whether and how the proposed method can be used to implement ACLs in a disc-oriented system.<>