This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Dynamic analysis of the effects access rule modifications have upon security
Aug. 1986 (vol. 12 no. 8)
pp. 866-870
Robert P. Trueblood, Department of Computer Science, University of South Carolina, Columbia, SC 29208
A. Sengupta, Department of Computer Science, University of South Carolina, Columbia, SC 29208
This correspondence presents a novel technique for analyzing the relationships among the predicates in a predicate-based security model for database management systems. The principal tool of the technique is the “Boolean difference” which is used to examine the relationships among the predicates when users are allowed to be members of more than one user group. The effects of changing (deleting or adding) predicates on the user group definition are identified by the technique. The technique is most valuable to information security au-thorizers who define and maintain access control rules.
Index Terms:
Databases,Personnel,Permission,Authorization,Probes,security,Access control,analysis of access rights,authorization,Boolean difference
Citation:
Robert P. Trueblood, A. Sengupta, "Dynamic analysis of the effects access rule modifications have upon security," IEEE Transactions on Software Engineering, vol. 12, no. 8, pp. 866-870, Aug. 1986, doi:10.1109/TSE.1986.6312989
Usage of this product signifies your acceptance of the Terms of Use.