Argos - A Configurable Access Control System for Interoperable Environments

The integration of autonomous information systems causes a fundamental problem for security management. How to ensure a consistent authorisation state if several independent software components are involved, each having an access control system of its own? In other words, how to ensure an organisation-wide security policy?

[1]  David L. Spooner,et al.  The Impact of Inheritance on Security in Object-Oriented Database Systems , 1988, DBSec.

[2]  Jie Wu,et al.  User Group Structures in Object-Oriented Database Authorization , 1994, DBSec.

[3]  Elisa Bertino,et al.  A model of authorization for next-generation database systems , 1991, TODS.

[4]  Elisa Bertino,et al.  An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..

[5]  John R. Nicol,et al.  Object orientation in heterogeneous distributed computing systems , 1993, Computer.

[6]  Rafiul Ahad,et al.  Supporting Access Control in an Object-Oriented Database Language , 1992, EDBT.

[7]  David L. Spooner,et al.  Discretionary Access Control in Object-Oriented Engineering Database Systems , 1990, DBSec.

[8]  Elisa Bertino,et al.  Access Control in Object-Oriented Database Systems - Some Approaches and Issues , 1993, Advanced Database Systems.

[9]  Peter J. Denning,et al.  Protection: principles and practice , 1972, AFIPS '72 (Spring).

[10]  Ching-Yi Wang,et al.  Access Control in a Heterogeneous Distributed Database Management System , 1987, IEEE International Symposium on Reliable Distributed Systems.

[11]  Ehud Gudes,et al.  Security Policies in Object-Oriented Databases , 1989, DBSec.

[12]  William Kent,et al.  Object-Orientation and Interoperability , 1993, NATO ASI OODBS.

[13]  Teresa F. Lunt Access control policies: Some unanswered questions , 1989, Comput. Secur..

[14]  Klaus R. Dittrich,et al.  Discretionary Access Control in Structurally Object-Oriented Database Systems , 1988, DBSec.

[15]  Sylvia L. Osborn,et al.  Role-based security, object oriented databases and separation of duty , 1993, SGMD.

[16]  Ehud Gudes,et al.  A security model for object-oriented databases , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[17]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[18]  Klaus R. Dittrich,et al.  An Approach for Building Secure Database Federations , 1994, VLDB.

[19]  Ehud Gudes,et al.  A Model of Methods Access Authorization in Object-oriented Databases , 1993, VLDB.

[20]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[21]  Elisa Bertino,et al.  Data hiding and security in object-oriented databases , 1992, [1992] Eighth International Conference on Data Engineering.

[22]  Won Kim,et al.  A Model of Authorization for Object-Oriented and Semantic Databases , 1988, EDBT.

[23]  Elisa Bertino,et al.  A new Authorization Model for Object-Oriented Databases , 1994, DBSec.

[24]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[25]  David J. DeWitt,et al.  The Object-Oriented Database System Manifesto , 1994, Building an Object-Oriented Database System, The Story of O2.

[26]  Fèlix Saltor,et al.  Suitability of datamodels as canonical models for federated databases , 1991, SGMD.

[27]  T. C. Ting,et al.  User-Role Based Security Profiles for an Object-Oriented Design Model , 1993, DBSec.

[28]  Bradford W. Wade,et al.  An authorization mechanism for a relational database system , 1976, TODS.

[29]  Ronald Fagin,et al.  On an authorization mechanism , 1978, TODS.

[30]  Klaus R. Dittrich,et al.  An Object-Oriented Integration Framework for Building Heterogeneous Database Systems , 1992, DS-5.

[31]  Sylvia L. Osborn,et al.  Database Security Issues in Distributed Object-Oriented Databases , 1992, IWDOM.

[32]  Hans Hermann Brüggemann,et al.  Rights in an Object-Oriented Environment , 1991, DBSec.

[33]  T. C. Ting,et al.  Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model , 1991, DBSec.