Design aspects of access control in a knowledge base system

Access control is the granting and enforcement of priveleges to access information in a system. The design of access control for knowledge base systems is based on access control concepts found in database systems. Additional characteristics found in knowledge base systems include object-oriented features as well as temporal information and predicative assertion languages to describe rules and constraints. Of particular complexity is the implication of access control on inherited objects, rules and constraints. The Group Security model provides users with discretionary access control to objects in a knowledge base system according to their requirement for a task. Further benefits and opportunities are achieved as a result of implementing access control in knowledge base systems.

[1]  Matthias Jarke,et al.  A decision-based configuration process model , 1990, [1990] Proceedings. 12th International Conference on Software Engineering.

[2]  D. E. Bell,et al.  Secure Computer Systems : Mathematical Foundations , 2022 .

[3]  Matthias Jarke,et al.  Telos: representing knowledge about information systems , 1990, TOIS.

[4]  Dorothy E. Denning,et al.  The SeaView Security Model , 1990, IEEE Trans. Software Eng..

[5]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[6]  David K. Hsiao,et al.  A Semantic Model for Data Base Protection Languages , 1976, VLDB.

[7]  T. C. Ting A User-Role Based Data Security Approach , 1988, Database Security.

[8]  Dorothy E. Denning,et al.  The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[9]  Heribert Pfefferle,et al.  Autorisierung und Zugriffsüberwachung in strukturell objekt-orientierten Datenbanksystemen , 1989, BTW.

[10]  Eduardo B. Fernández,et al.  Data Base Security: Requirements, Policies, and Models , 1980, IBM Syst. J..

[11]  Joachim Biskup,et al.  The personal model of data: Towards a privacy-oriented information system , 1988, Comput. Secur..

[12]  Eduardo B. Fernández,et al.  Database security , 1990, SGMD.

[13]  Deborah Downs,et al.  Issues in Discretionary Access Control , 1985, 1985 IEEE Symposium on Security and Privacy.

[14]  David Elliott Bell Concerning 'modeling' of computer security , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[15]  David J. DeWitt,et al.  The Object-Oriented Database System Manifesto , 1994, Building an Object-Oriented Database System, The Story of O2.

[16]  Peter J. Denning,et al.  Data Security , 1979, CSUR.

[17]  Thomas A. Berson,et al.  Multilevel Security for Knowledge-Based Systems , 1987, 1987 IEEE Symposium on Security and Privacy.

[18]  Klaus R. Dittrich,et al.  Discretionary Access Control in Structurally Object-Oriented Database Systems , 1988, DBSec.

[19]  Joachim Biskup,et al.  Analysis of the Privacy Model for the Information System DORIS , 1988, DBSec.