Security Policies in Replicated and Autonomous Databases
Gudes and Olivier
1999
Citation information
E. Gudes and M. S. Olivier. “Security Policies in Replicated and Autonomous Databases”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 93–107Abstract
Autonomous object databases are becoming important in the Internet world of today and involve integration of several local databases. Such databases support local access for transactions and queries and local control over authorization of classes and objects. At the same time, these database objects are often replicated in various sites and are available for access by global queries and transactions. Such global access, which may involve a global query optimizer, is required to handle conflicts between the local authorizations of replicated objects, but give consistent results regardless of site dependent optimizations.
The paper uses previous models for object-based authorization, and extends them with policies to handle conflicts between local and global authorizations. It also discusses object migration and security administration. The problem of providing autonomy in a consistent way is discussed extensively.
Full text
A pre- or postprint of the publication is available at https://mo.co.za/ask/local.pdf.Note that a username and password are required to download the full text. (Why?) Please e-mail me and I will send you a username and password.
Definitive version
The definitive version of the paper is available from the publisher.DOI: 10.1007/978-0-387-35564-1_6
BibTeX reference
@inproceedings(local,author={Ehud Gudes and Martin S Olivier},
title={Security Policies in Replicated and Autonomous Databases},
editor={Sushil Jajodia},
booktitle={Database Security XII: Status and Prospects},
pages={93--107},
publisher={Kluwer},
year={1999} )