Authorization analysis of queries in object-oriented databases [chapter]

Hiroyuki Seki, Yasunori Ishihara, Minora Ito
1995 Lecture Notes in Computer Science  
A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorizations. As an underlying model of method execution, we adopt the model proposed by Hull et al.; a database schema consists of a class hierarchy, attribute declarations and method definitions. A method body is simply a sequence of statements. There are three types of statements: an access to an attribute of the self object, a method
more » ... vocation, and a built-in operation on basic values. Authorizations are represented as a pair of finite sets: AUTH = ¢ AUTH m £ AUTH s ¤ , AUTHm = (¥ 1
doi:10.1007/3-540-60608-4_59 fatcat:75yjsnd2xrbffoozm2ro7jzreu