The security problems of object-oriented database system are investigated and security level assignment constraints and an access control mechanism based on the multilevel access control security policy are proposed. The proposed mechanism uses the Trusted Computing Base. A unique feature of the mechanism is that security levels are assigned not only to data items (objects), but also to methods and methods are not shown to the users whose security level is lower than that of the methods. And we distinguish between the security level of a variable in a class and that in an instance and distinguish between the level of an object when it is taken by itself and it is taken as a variable or an element of another complex object. All of this realizes the policy of multilevel access control.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Tadashi ARAKI, Tetsuya CHIKARAISHI, Thomas HARDJONO, Tadashi OHTA, Nobuyoshi TERASHIMA, "An Access Control Mechanism for Object-Oriented Database Systems" in IEICE TRANSACTIONS on Fundamentals,
vol. E76-A, no. 1, pp. 112-121, January 1993, doi: .
Abstract: The security problems of object-oriented database system are investigated and security level assignment constraints and an access control mechanism based on the multilevel access control security policy are proposed. The proposed mechanism uses the Trusted Computing Base. A unique feature of the mechanism is that security levels are assigned not only to data items (objects), but also to methods and methods are not shown to the users whose security level is lower than that of the methods. And we distinguish between the security level of a variable in a class and that in an instance and distinguish between the level of an object when it is taken by itself and it is taken as a variable or an element of another complex object. All of this realizes the policy of multilevel access control.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e76-a_1_112/_p
Copy
@ARTICLE{e76-a_1_112,
author={Tadashi ARAKI, Tetsuya CHIKARAISHI, Thomas HARDJONO, Tadashi OHTA, Nobuyoshi TERASHIMA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={An Access Control Mechanism for Object-Oriented Database Systems},
year={1993},
volume={E76-A},
number={1},
pages={112-121},
abstract={The security problems of object-oriented database system are investigated and security level assignment constraints and an access control mechanism based on the multilevel access control security policy are proposed. The proposed mechanism uses the Trusted Computing Base. A unique feature of the mechanism is that security levels are assigned not only to data items (objects), but also to methods and methods are not shown to the users whose security level is lower than that of the methods. And we distinguish between the security level of a variable in a class and that in an instance and distinguish between the level of an object when it is taken by itself and it is taken as a variable or an element of another complex object. All of this realizes the policy of multilevel access control.},
keywords={},
doi={},
ISSN={},
month={January},}
Copy
TY - JOUR
TI - An Access Control Mechanism for Object-Oriented Database Systems
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 112
EP - 121
AU - Tadashi ARAKI
AU - Tetsuya CHIKARAISHI
AU - Thomas HARDJONO
AU - Tadashi OHTA
AU - Nobuyoshi TERASHIMA
PY - 1993
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E76-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 1993
AB - The security problems of object-oriented database system are investigated and security level assignment constraints and an access control mechanism based on the multilevel access control security policy are proposed. The proposed mechanism uses the Trusted Computing Base. A unique feature of the mechanism is that security levels are assigned not only to data items (objects), but also to methods and methods are not shown to the users whose security level is lower than that of the methods. And we distinguish between the security level of a variable in a class and that in an instance and distinguish between the level of an object when it is taken by itself and it is taken as a variable or an element of another complex object. All of this realizes the policy of multilevel access control.
ER -