Abstract
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of database applications. In this paper we show how it can be used to manage data security. The model is based on updateable object views built within the stack-based approach to object-oriented query languages. After inserting the overloading view on top of the given population of objects all references to the objects come via the view. Thus the view can implement additional security semantics independently on the object implementation. Views allow one to add such new semantic to all the operations (retrieve, insert, update, delete) that can be performed on the objects. In our model overloading views are named encapsulated database entities that can be dynamically inserted, modified or deleted. Because virtual objects delivered by an overloading view are not distinguishable from stored objects, the overloading views model allows one to form a chain of views, where each next view adds new semantics (a specific concern) to the semantics introduces by the object implementation and previous views. In this way any new security requirement can be implemented independently from other requirements.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Baraaani-Dastjerdi, A., Pieprzyk, J., Safari-Naini, R.: Security in Databases: A Survey Study (1996) (manuscript)
Bertino, E., Jajodia, S., Samarati, P.: A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Information Systems 17(2) (1999)
Czarnecki, K., Eisenecker, U.W.: Generetive Programming. In: Methods, Tools and Applications, Addison-Wesley, Reading (2000)
Fernndez-Medina, E., Piattini, M.: A Methodology for Multilevel Database Design. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, Springer, Heidelberg (2003)
Intelligent Content Management System, IST-2001-32429, 5th EC Framework Programme, www.icons.rodan.pl
Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J., Irwin, J.: Aspect-Oriented Programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220–242. Springer, Heidelberg (1997)
Kiernan, J., Agrawal, R.: Watermarking Relational Databases. In: Proc. 28th Int’l Conf. Very Large Databases VLDB (2002)
Kozankiewicz, H., Leszczyłowski, J., Płodzie, J., Subieta, K.: Updateable Object Views. Institute of Computer Science Polish Ac. Sci. Report 950 (October 2002)
Kozankiewicz, H., Leszczyłowski, J., Subieta, K.: Updateable Views for an XML Query Language. In: Proc. 15th CAiSE Conf. (2003)
Kozankiewicz, H., Leszczyłowski, J., Subieta, K.: Implementing Mediators through Virtual Updateable Views. In: Proc. 5th EFIS Workshop, Coventry, UK (2003)
Kozankiewicz, H., Leszczyłowski, J., Subieta, K.: Updateable XML Views. In: Kalinichenko, L.A., Manthey, R., Thalheim, B., Wloka, U. (eds.) ADBIS 2003. LNCS, vol. 2798, pp. 381–399. Springer, Heidelberg (2003)
Kozankiewicz, H., Subieta, K.: SBQL Views – Prototype of Updateable Views. In: Proc. 8th ADBIS Conf., Budapest, Hungary (September 2004) (to appear)
Object Data Management Group: The Object Database Standard ODMG, Release 3.0. R.G.G.Cattel, D.K.Barry, Ed., Morgan Kaufmann (2000)
Osborn, S.: Database Security Integration using Role-Based Access Control. In: IFIP WG11.3 Working Conference on Database Security (August 2000)
Rashid, A.: Aspect-Oriented Database Systems. Springer, Heildelberg (2004)
Subieta, K., Beeri, C., Matthes, F., Schmidt, J.W.: A Stack-Based Approach to Query Languages. In: Proc. East-West Database Workshop, 1994, Springer Workshops in Computing (1995)
Subieta, K., Kambayashi, Y., Leszczyłowski, J.: Procedures in Object-Oriented Query Languages. In: Proc. 21-st VLDB Conf., Zurich, pp. 182–193 (1995)
Subieta, K.: Object-Oriented Standards. In: Can ODMG OQL Be Extended to a Programming Language? Cooperative Databases and Applications, pp. 459–468. World Scientific, Singapore (1997)
Subieta, K.: Theory and Construction of Object-Oriented Query Languages. Editors of the Polish-Japanese Institute of Information Technology, p. 520 (2004)
W3C: XQuery 1.0: An XML Query Language. W3C Working Draft 12 (November 2003), http://www.w3.org/TR/xquery/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Adamus, R., Subieta, K. (2004). Security Management Through Overloading Views. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE. OTM 2004. Lecture Notes in Computer Science, vol 3291. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30469-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-540-30469-2_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23662-7
Online ISBN: 978-3-540-30469-2
eBook Packages: Springer Book Archive