A cryptographic mechanism for object-instance-based authorization in object-oriented database systems

Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getia

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

In this paper a mechanism for access control at the instance level of a class in object-oriented databases is suggested. The approach is based on the use of pseudo-random functions and sibling intractable functions. Each object-instance in the object-oriented model is associated with access keys that insure secure access to the object and all related objects. The security of the system depends on the difficulty of predicting the output of pseudo-random functions and finding extra collision for the sibling intractable function family. The authorization system supports ownership and granting/revoking of access rights.

Original languageEnglish
Title of host publicationOOER 1995: Object-Oriented and Entity-Relationship Modeling - 14th International Conference, Proceedings
Place of PublicationBerlin ; New York
PublisherSpringer, Springer Nature
Pages44-54
Number of pages11
Volume1021
ISBN (Print)3540606726, 9783540606727
Publication statusPublished - 1995
Externally publishedYes
Event14th International Conference on Object-Oriented Entity-Relationship, OOER 1995 - Gold Coast, Australia
Duration: 13 Dec 199515 Dec 1995

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1021
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other14th International Conference on Object-Oriented Entity-Relationship, OOER 1995
Country/TerritoryAustralia
CityGold Coast
Period13/12/9515/12/95

Keywords

  • Access control
  • Authorization system
  • Cryptography
  • DAC
  • Data security
  • Database security
  • Object-oriented databases

Fingerprint

Dive into the research topics of 'A cryptographic mechanism for object-instance-based authorization in object-oriented database systems'. Together they form a unique fingerprint.

Cite this