For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
A Formal Approach to Detecting Security Flaws in Object-Oriented Databases
Toshiyuki MORITA Yasunori ISHIHARA Hiroyuki SEKI Minoru ITO
IEICE TRANSACTIONS on Information and Systems
Publication Date: 1999/01/25
Print ISSN: 0916-8532
Type of Manuscript: Special Section PAPER (Special Issue on New Generation Database Technologies)
Category: Theoretical Aspects
object-oriented database, authorization, security flaw, term rewriting system,
Full Text: PDF(348.1KB)>>
Detecting security flaws is important in order to keep the database secure. A security flaw in object-oriented databases means that a user can infer the result of an unpermitted method only from permitted methods. Although a database management system enforces access control by an authorization, security flaws can occur under the authorization. The main aim of this paper is to show an efficient decision algorithm for detecting a security flaw under a given authorization. This problem is solvable in polynomial time in practical cases by reducing it to the congruence closure problem. This paper also mentions the problem of finding a maximal subset of a given authorization under which no security flaw exists.