数据库计算机访问控制机制(DBC)

J. Menon, D. K. Hsiao
{"title":"数据库计算机访问控制机制(DBC)","authors":"J. Menon, D. K. Hsiao","doi":"10.1145/647003.711749","DOIUrl":null,"url":null,"abstract":"The database computer (DBC) is a specialized back-end computer which is capable of managing data 10 10 bytes in size and supporting known data models such as relational, network, hierarchical and attribute-based models. It is also perhaps the first database machine to have a built-in security mechanism for access control. At the outset, the security mechanism was made an integral part of the DBC design. This design philosophy not only allowed us to construct a system that has no “backdoors”, but also ensured that all access requests are, in fact, controlled by DBC's security mechanism. The DBC security mechanism is based on the concept of security atoms, aggregates of data units being definable by the user in terms of conjunctions of query predicates. The fundamental gain in utilizing query conjunctions for the purpose of access control is that any data that is accessible or updateable is also protectable. It is believed that the DBC security mechanism is less cumbersome than the view mechanism of some database systems and more efficient than the query modification mechanism used by some other systems. This is demonstrated at three levels of access control, namely the subfile, record and field (attribute) levels.","PeriodicalId":328859,"journal":{"name":"Computer Architecture Workshop","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1980-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Access Control Mechanism of a Database Computer (DBC)\",\"authors\":\"J. Menon, D. K. Hsiao\",\"doi\":\"10.1145/647003.711749\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The database computer (DBC) is a specialized back-end computer which is capable of managing data 10 10 bytes in size and supporting known data models such as relational, network, hierarchical and attribute-based models. It is also perhaps the first database machine to have a built-in security mechanism for access control. At the outset, the security mechanism was made an integral part of the DBC design. This design philosophy not only allowed us to construct a system that has no “backdoors”, but also ensured that all access requests are, in fact, controlled by DBC's security mechanism. The DBC security mechanism is based on the concept of security atoms, aggregates of data units being definable by the user in terms of conjunctions of query predicates. The fundamental gain in utilizing query conjunctions for the purpose of access control is that any data that is accessible or updateable is also protectable. It is believed that the DBC security mechanism is less cumbersome than the view mechanism of some database systems and more efficient than the query modification mechanism used by some other systems. This is demonstrated at three levels of access control, namely the subfile, record and field (attribute) levels.\",\"PeriodicalId\":328859,\"journal\":{\"name\":\"Computer Architecture Workshop\",\"volume\":\"85 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1980-03-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Architecture Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/647003.711749\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Architecture Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/647003.711749","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

数据库计算机(DBC)是一种专门的后端计算机,它能够管理10个字节大小的数据,并支持已知的数据模型,如关系、网络、层次和基于属性的模型。它也可能是第一台具有内置访问控制安全机制的数据库机器。从一开始,安全机制就成为DBC设计的一个组成部分。这种设计理念不仅允许我们构建一个没有“后门”的系统,而且还确保所有访问请求实际上都由DBC的安全机制控制。DBC安全机制基于安全原子的概念,用户可以根据查询谓词的连接定义数据单元的集合。将查询连接词用于访问控制的基本好处是,任何可访问或可更新的数据都是可保护的。人们认为DBC安全机制比某些数据库系统的视图机制更简单,比其他一些系统使用的查询修改机制更有效。这在三个访问控制级别上进行了演示,即子文件、记录和字段(属性)级别。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Access Control Mechanism of a Database Computer (DBC)
The database computer (DBC) is a specialized back-end computer which is capable of managing data 10 10 bytes in size and supporting known data models such as relational, network, hierarchical and attribute-based models. It is also perhaps the first database machine to have a built-in security mechanism for access control. At the outset, the security mechanism was made an integral part of the DBC design. This design philosophy not only allowed us to construct a system that has no “backdoors”, but also ensured that all access requests are, in fact, controlled by DBC's security mechanism. The DBC security mechanism is based on the concept of security atoms, aggregates of data units being definable by the user in terms of conjunctions of query predicates. The fundamental gain in utilizing query conjunctions for the purpose of access control is that any data that is accessible or updateable is also protectable. It is believed that the DBC security mechanism is less cumbersome than the view mechanism of some database systems and more efficient than the query modification mechanism used by some other systems. This is demonstrated at three levels of access control, namely the subfile, record and field (attribute) levels.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信