{"title":"协同数据访问环境中的访问规则一致性","authors":"Meixing Le, K. Kant, S. Jajodia","doi":"10.4108/ICST.COLLABORATECOM.2012.250467","DOIUrl":null,"url":null,"abstract":"In this paper we consider the situation where a set of enterprises need to collaborate to provide rich services to their clients. Such collaboration often requires controlled access to each other's data, which we assume is stored in standard relational form. The access control is provided by a set of access rules that may be defined over the joins of various relations. In this paper we introduce the notion of consistency of access rules and devise an algorithm to ensure consistency. We also consider the possibility of occasional changes in access rules and address the problem of maintaining consistency in the face of such changes. We propose algorithms for both changes with new privileges grants and revocations on existing privileges.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Access rule consistency in cooperative data access environment\",\"authors\":\"Meixing Le, K. Kant, S. Jajodia\",\"doi\":\"10.4108/ICST.COLLABORATECOM.2012.250467\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we consider the situation where a set of enterprises need to collaborate to provide rich services to their clients. Such collaboration often requires controlled access to each other's data, which we assume is stored in standard relational form. The access control is provided by a set of access rules that may be defined over the joins of various relations. In this paper we introduce the notion of consistency of access rules and devise an algorithm to ensure consistency. We also consider the possibility of occasional changes in access rules and address the problem of maintaining consistency in the face of such changes. We propose algorithms for both changes with new privileges grants and revocations on existing privileges.\",\"PeriodicalId\":225191,\"journal\":{\"name\":\"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250467\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Access rule consistency in cooperative data access environment
In this paper we consider the situation where a set of enterprises need to collaborate to provide rich services to their clients. Such collaboration often requires controlled access to each other's data, which we assume is stored in standard relational form. The access control is provided by a set of access rules that may be defined over the joins of various relations. In this paper we introduce the notion of consistency of access rules and devise an algorithm to ensure consistency. We also consider the possibility of occasional changes in access rules and address the problem of maintaining consistency in the face of such changes. We propose algorithms for both changes with new privileges grants and revocations on existing privileges.