Data protection in distributed database systems

Chun Ruan*, Vijay Varadharajan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Abstract

In this paper, we propose an authorization model for distributed databases. Multiple object granularity of authorizations, such as global relations, fragments and attributes, are supported. Administrative privilege can be delegated from one subject to another to provide decentralized authorization administration. Authorization propagations along both the relation fragmentation tree and the subject group-subgroup hierarchical tree are also considered. Further more, conflict resolution policy is provided that supports well controlled delegations and exceptions. Overall the system provides a very flexible framework for specifying and evaluating the authorizations in distributed database systems.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsMohand-Saïd Hacid, Neil V. Murray, Zbigniew W. Ras, Shusaku Tsumoto
Place of PublicationBerlin; New York
PublisherSpringer, Springer Nature
Pages191-199
Number of pages9
Volume3488 LNAI
ISBN (Electronic)9783540319498
ISBN (Print)3540258787, 9783540258780
Publication statusPublished - 2005
Event15th International Symposium on Methodologies for Intelligent Systems, ISMIS 2005 - Saratoga Springs, NY, United States
Duration: 25 May 200528 May 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3488 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other15th International Symposium on Methodologies for Intelligent Systems, ISMIS 2005
CountryUnited States
CitySaratoga Springs, NY
Period25/05/0528/05/05

Keywords

  • Authorization
  • Distributed database

Fingerprint Dive into the research topics of 'Data protection in distributed database systems'. Together they form a unique fingerprint.

Cite this