{"title":"基于规则的数据库访问控制——一种实用的方法","authors":"T. Didriksen","doi":"10.1145/266741.266772","DOIUrl":null,"url":null,"abstract":"This paper describes a scheme to partition a database into fragments, and to associate access constraints in the form of declarative rules with these fragments. We present SQL extensions to specify data fragmentation and access constraints. nom this, a compiler generates triggers which verify that users do not violate the constraints. Major practical requirements for the implementation of our access control scheme are that existing application code must be left unchanged, and that an efficient implementation based on standard database management systems is possible. Our strategy has been applied successfully at Telenor -a Norwegian telephony service provider.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"289 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Rule based database access control—a practical approach\",\"authors\":\"T. Didriksen\",\"doi\":\"10.1145/266741.266772\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes a scheme to partition a database into fragments, and to associate access constraints in the form of declarative rules with these fragments. We present SQL extensions to specify data fragmentation and access constraints. nom this, a compiler generates triggers which verify that users do not violate the constraints. Major practical requirements for the implementation of our access control scheme are that existing application code must be left unchanged, and that an efficient implementation based on standard database management systems is possible. Our strategy has been applied successfully at Telenor -a Norwegian telephony service provider.\",\"PeriodicalId\":355233,\"journal\":{\"name\":\"ACM Workshop on Role-Based Access Control\",\"volume\":\"289 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM Workshop on Role-Based Access Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/266741.266772\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Workshop on Role-Based Access Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/266741.266772","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Rule based database access control—a practical approach
This paper describes a scheme to partition a database into fragments, and to associate access constraints in the form of declarative rules with these fragments. We present SQL extensions to specify data fragmentation and access constraints. nom this, a compiler generates triggers which verify that users do not violate the constraints. Major practical requirements for the implementation of our access control scheme are that existing application code must be left unchanged, and that an efficient implementation based on standard database management systems is possible. Our strategy has been applied successfully at Telenor -a Norwegian telephony service provider.