{"title":"Access control in a relational data base management system by query modification","authors":"M. Stonebraker, E. Wong","doi":"10.1145/800182.810400","DOIUrl":null,"url":null,"abstract":"This work describes the access control system being implemented in INGRES (<Underline>IN</Underline>teractive <Underline>G</Underline>raphics and <Underline>RE</Underline>trieval <Underline>S</Underline>ystem). The scheme can be applied to any relational data base management system and has several advantages over other suggested schemes.\n These include: a) implementation ease\nb) small execution time overhead\nc) powerful and flexible controls\nd) conceptual simplicity\nThe basic idea utilized is that a user interaction with the data base is modified to an alternate form which is guaranteed to have no access violations. This modification takes place in a high level interaction language. Hence, the processing of a resulting interaction can be accomplished with no further regard for protection. In particular, any procedure calls in the access paths for control purposes, such as in [1,2], are avoided.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"154","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '74","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800182.810400","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 154
Abstract
This work describes the access control system being implemented in INGRES (INteractive Graphics and REtrieval System). The scheme can be applied to any relational data base management system and has several advantages over other suggested schemes.
These include: a) implementation ease
b) small execution time overhead
c) powerful and flexible controls
d) conceptual simplicity
The basic idea utilized is that a user interaction with the data base is modified to an alternate form which is guaranteed to have no access violations. This modification takes place in a high level interaction language. Hence, the processing of a resulting interaction can be accomplished with no further regard for protection. In particular, any procedure calls in the access paths for control purposes, such as in [1,2], are avoided.