Full protection specifications in the semantic model for database protection languages

15Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

The basic model of semantics for protection languages is reviewed. Advanced protection features are introduced into the model and their impact on authorization and enforcement is discussed. History keeping allows access dependency upon the occurrence of previous data operations. Auxiliary program invocatiom provides for additional (procedural) protection measures. Extended authorization permits a user to utilize, via authorized procedures, data which are not directly accessible by him. Examples are used to explain each of these features. The enforcement process for full specifications is illustrated with an example.

Cite

CITATION STYLE

APA

Hartson, H. R., & Hsiao, D. K. (1976). Full protection specifications in the semantic model for database protection languages. In Proceedings of the 1976 Annual conference, ACM 1976 (pp. 90–95). Association for Computing Machinery, Inc. https://doi.org/10.1145/800191.805538

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free