skip to main content
article
Free Access

A transformational grammar-based query processor for access control in a planning system

Published:01 December 1977Publication History
Skip Abstract Section

Abstract

Providing computer facilities and data availability to larger numbers of users generates increased system vulnerability which is partially offset by software security systems. Much too often these systems are presented as ad hoc additions to the basic data management system. One very important constituent of software security systems is the access control mechanism which may be the last resource available to prohibit unauthorized data retrieval. This paper presents a specification for an access control mechanism. The mechanism is specified in a context for use with the GPLAN decision support system by a theoretical description consistent with the formal definition of GPLAN's query language. Incorporation of the mechanism into the language guarantees it will not be an ad hoc addition. Furthermore, it provides a facile introduction of data security dictates into the language processor.

References

  1. 1 AHO, A.~., AND ULLMAN, J.D. The Theory of Parsing, Translating and Compiling. Prentice- Hall, Englewood Cliffs, N.J., 1972. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 BosczEK, R.H., CASH, J.I., HASE~tAN, W.D., HOLSAPFLE, C., AND WHINSTON, A.B. Generalized planning system/data management system (GPLAN/DMS) users' manual. Tech. Rep., Krannert Graduate School of Management, Purdue U., W. Lafayette, Ind., Aug. 1975.Google ScholarGoogle Scholar
  3. 3 BONCZEK, R.H., HASEMAN, W.D., AND WHINSTON, A.B. Structure of a query language for a network data base. Tech. Rep., Krannert Graduate School of Management, Purdue U., W. Lafayette, Ind., Aug. 1975.Google ScholarGoogle Scholar
  4. 4 BVRT, M.K. From Deep to Surface Structure. Harper and Row, New York, 1971.Google ScholarGoogle Scholar
  5. 5 CASH, J.I., HASEMAN, W.D., AND WmNSTON, A.B. Security for the GPLAN system. Inform. Syst. 2, 2 (1976), 41-48.Google ScholarGoogle ScholarCross RefCross Ref
  6. 6 CODASYL. Data Base Task Group Report. April 1971 (available from ACM, New York).Google ScholarGoogle Scholar
  7. 7 CONWAY, R.W., MAXWELL, W.L., AND MORGAN, H.L. On the implementation of security measures in information systems. Comm. A CM 15, 4 (April 1972), 211-220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8 DENNING, D.E. Secure information flow in computer systems. Ph.D. Diss., Comptr. Sci. Dept., Purdue U., W. Lafayette, Ind., May 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9 DENN:NG, D.E. A lattice model of secure information flow. Comm. ACM 19, 5 (May 1976), 236-242. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 FERNANDEZ, E.B., SUMMERS, R.C., ANY COLEMAN, C.D. An authorization model for a shared data base. Proc. ACM-SIGMOD Conf., San Jose, Calif., May 1975, pp. 23-31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 GRINDER, J.T., AND ELGIN, S.H. Guide to Transformational Grammar. Holt, Rinehart and Winston, New York, 1973.Google ScholarGoogle Scholar
  12. 12 HARVSON, H.R. Languages for specifying protection requirements in data base systems--a semantic model. Tech. Rep., Comptr. and Inform. Sci. Res. Ctr., Ohio State U., Columbus, Ohio, Aug. 1975.Google ScholarGoogle Scholar
  13. 13 HARTSON, H.R., AND I'tSIAO, D.K. A semantic model for data base protection languages. In Systems for Large Data Bases, P. Lockemann and E. Neuhold, Eds., North-Holland Pub. Co., Amsterdam, 1976, pp. 27-42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14 HARTSON, I'I.R., AND HSIAO, D.K. Full protection specifications in the semantic model for data base protection languages. Proc. 1976 ACM Nat. Conf., Houston, Tex., 1976, pp. 90-95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 HASEMAN, W.D. GPLAN: an operational DSS. Database (ACM) 8, 3 (Winter 1977), 73-78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 HASEMAN, W.D., AND WHINSTON, A.B. Introduction to Data Management. Richard D. Irwin, Homewood, Ill., 1977.Google ScholarGoogle Scholar
  17. 17 HELD, G.D., STONEB~AKER, M.R., AND WONG, E. INGRES--a relational data system. Proc. AFIPS 1975 NCC, AFIPS Press, Montvale, N.j., 1975, pp. 409-416.Google ScholarGoogle Scholar
  18. 18 HOFFMAN, L.J. The formulary model for flexible privacy and access control. Proc. AFIPS 1971 FJCC, AFIPS Press, Montvale, N.J., 1971, pp. 587--601.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 HOPCROFT, J.E., AND ULLMAN, J.D. Formal Languages and Their Relation to Automata. Addison-Wesley, Reading, Mass., 1969. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20 Josm, A.K. Remarks on some aspects of language structure and their relevance to pattern analysis. Pattern Recognition 5 (1973), 347-360.Google ScholarGoogle Scholar
  21. 21 KIMBALL, J.P. The Formal Theory of Grammar. Prentice-Hall, Englewood Cliffs, N.J., 1973.Google ScholarGoogle Scholar
  22. 22 MILLER, J.S., P~PE, J.T., M:KKELSON, C.M., AND W~G~RE:~, B. A description of a programming language for the AADC. intermetrics Rep. CDRB003, Naval Electronics Laboratory, Washington, D.C., April 1973.Google ScholarGoogle Scholar
  23. 23 MORRIS, J.H. JR. Protection in programming languages. Comm. ACM 16, 1 (Jan. 1973), 15-21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24 Row~T, N. An Introduction to Generative Grammar. Transl. by N.S.I.I. Smith, North- Holland Pub. Co., Amsterdam, 1973.Google ScholarGoogle Scholar
  25. 25 Saltzer, J.H. Protection and the control of information sharing in Multics. Comm. ACM 17, 7 (July 1974), 388-402. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26 SUMMERS, R.D., COLEMAN, C.D., AND FERNJ{NDEZ, E.B. A programming language approach to secure data base access. Tech. Rep. G320-2662, IBM Corp., Yorktown Heights, N.Y., May 1974.Google ScholarGoogle Scholar
  27. 27 WH:NSTON, A.B., AND I'IAsEMAN, W.D. A data base for nonprogrammers. Datamation 21, 5 (May 1975), 101-107.Google ScholarGoogle Scholar

Index Terms

  1. A transformational grammar-based query processor for access control in a planning system

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader