Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3291))

  • 556 Accesses

Abstract

The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of database applications. In this paper we show how it can be used to manage data security. The model is based on updateable object views built within the stack-based approach to object-oriented query languages. After inserting the overloading view on top of the given population of objects all references to the objects come via the view. Thus the view can implement additional security semantics independently on the object implementation. Views allow one to add such new semantic to all the operations (retrieve, insert, update, delete) that can be performed on the objects. In our model overloading views are named encapsulated database entities that can be dynamically inserted, modified or deleted. Because virtual objects delivered by an overloading view are not distinguishable from stored objects, the overloading views model allows one to form a chain of views, where each next view adds new semantics (a specific concern) to the semantics introduces by the object implementation and previous views. In this way any new security requirement can be implemented independently from other requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Baraaani-Dastjerdi, A., Pieprzyk, J., Safari-Naini, R.: Security in Databases: A Survey Study (1996) (manuscript)

    Google Scholar 

  2. Bertino, E., Jajodia, S., Samarati, P.: A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Information Systems 17(2) (1999)

    Google Scholar 

  3. Czarnecki, K., Eisenecker, U.W.: Generetive Programming. In: Methods, Tools and Applications, Addison-Wesley, Reading (2000)

    Google Scholar 

  4. Fernndez-Medina, E., Piattini, M.: A Methodology for Multilevel Database Design. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, Springer, Heidelberg (2003)

    Google Scholar 

  5. Intelligent Content Management System, IST-2001-32429, 5th EC Framework Programme, www.icons.rodan.pl

  6. Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J., Irwin, J.: Aspect-Oriented Programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220–242. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  7. Kiernan, J., Agrawal, R.: Watermarking Relational Databases. In: Proc. 28th Int’l Conf. Very Large Databases VLDB (2002)

    Google Scholar 

  8. Kozankiewicz, H., Leszczyłowski, J., Płodzie, J., Subieta, K.: Updateable Object Views. Institute of Computer Science Polish Ac. Sci. Report 950 (October 2002)

    Google Scholar 

  9. Kozankiewicz, H., Leszczyłowski, J., Subieta, K.: Updateable Views for an XML Query Language. In: Proc. 15th CAiSE Conf. (2003)

    Google Scholar 

  10. Kozankiewicz, H., Leszczyłowski, J., Subieta, K.: Implementing Mediators through Virtual Updateable Views. In: Proc. 5th EFIS Workshop, Coventry, UK (2003)

    Google Scholar 

  11. Kozankiewicz, H., Leszczyłowski, J., Subieta, K.: Updateable XML Views. In: Kalinichenko, L.A., Manthey, R., Thalheim, B., Wloka, U. (eds.) ADBIS 2003. LNCS, vol. 2798, pp. 381–399. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Kozankiewicz, H., Subieta, K.: SBQL Views – Prototype of Updateable Views. In: Proc. 8th ADBIS Conf., Budapest, Hungary (September 2004) (to appear)

    Google Scholar 

  13. Object Data Management Group: The Object Database Standard ODMG, Release 3.0. R.G.G.Cattel, D.K.Barry, Ed., Morgan Kaufmann (2000)

    Google Scholar 

  14. Osborn, S.: Database Security Integration using Role-Based Access Control. In: IFIP WG11.3 Working Conference on Database Security (August 2000)

    Google Scholar 

  15. Rashid, A.: Aspect-Oriented Database Systems. Springer, Heildelberg (2004)

    MATH  Google Scholar 

  16. Subieta, K., Beeri, C., Matthes, F., Schmidt, J.W.: A Stack-Based Approach to Query Languages. In: Proc. East-West Database Workshop, 1994, Springer Workshops in Computing (1995)

    Google Scholar 

  17. Subieta, K., Kambayashi, Y., Leszczyłowski, J.: Procedures in Object-Oriented Query Languages. In: Proc. 21-st VLDB Conf., Zurich, pp. 182–193 (1995)

    Google Scholar 

  18. Subieta, K.: Object-Oriented Standards. In: Can ODMG OQL Be Extended to a Programming Language? Cooperative Databases and Applications, pp. 459–468. World Scientific, Singapore (1997)

    Google Scholar 

  19. Subieta, K.: Theory and Construction of Object-Oriented Query Languages. Editors of the Polish-Japanese Institute of Information Technology, p. 520 (2004)

    Google Scholar 

  20. W3C: XQuery 1.0: An XML Query Language. W3C Working Draft 12 (November 2003), http://www.w3.org/TR/xquery/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Adamus, R., Subieta, K. (2004). Security Management Through Overloading Views. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE. OTM 2004. Lecture Notes in Computer Science, vol 3291. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30469-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30469-2_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23662-7

  • Online ISBN: 978-3-540-30469-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics