Abstract
We show how logic programs may be used to protect deductive databases from the unauthorized retrieval of positive and negative information, and from unauthorized insert and delete requests. To achieve this protection, a deductive database is expressed in a form that is guaranteed to permit only authorized access requests to be performed. The protection of the positive information that may be retrieved from a database and the information that may be inserted are treated in a uniform way as is the protection of the negative information in the database, and the information that may be deleted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barker, S., Data Protection by Logic Programming, 1st International Conference on Computational Logic, LNAI 1861, 1300–1313, Springer, 2000.
Barker, S., Secure Deductive Databases, 3rd Inat. Symp. on Practical Applications of Declarative Languages (PADL’01), LNCS 1990, Springer, 123–137, 2001.
Barker, S., TRBACN: A Temporal Authorization Model, Proc. MMMANCS International Workshop on Network Security, LNCS 2052, 178–188, Springer, 2001.
Barker. S., and Douglas, P., Secure Web Access, in preparation.
Barker. S., Extended Protected Databases, in preparation.
Bonatti, P., Kraus, S., and Subrahmanian, V., Foundations of Secure Deductive Databases, IEEE Trans. on Knowledge and Data Engineering, 7,3, 406–422, 1995.
Castano, S., Fugini, M., Martella, G., and Samarati, P., Database Security, Addison-Wesley, 1995.
Chen, W., and Warren, D., Tabled Evaluation with Delaying for General Logic Programs, J. A CM, 43(1), 20–74, 1996.
Cuppens, F., and Demolombe, R., A Modal Logical Framework for Security Policies, ISMIS’97, 1997.
Date, C., An Introduction to Database Systems, Addison-Wesley, 2000.
Ferraiolo, D., Gilbert, D., and Lynch, N., An Examination of Federal and Commercial Access Control Policy Needs, Proc. 16th NIST-NSA National Computer Security Conference, 107–116, 1993.
Gardenfors, P., Knowledge in Flux: Modeling the Dynamics of Epistemic States, MIT Press, 1988.
Hogger, C., Foundations of Logic Programming, Oxford, 1990.
Jajodia, S., Samarati, P., and Subrahmanian, V., A Logical Language for Expressing Authorizations, Proc. IEEE Symp. on Security and Privacy, 94–107, 1997.
Jamil, H., Belief Reasoning in MLS Deductive Databases, ACM SIGMOD’99, 109–120, 1999.
LLoyd, J., Foundations of Logic Programming, Springer, 1987.
Minker, J., Logic and Databases: A 20 Year Retrospective, 1st International Workshop on Logic in Databases, LNCS 1154, 3–57, Springer, 1996.
Przymusinski, T., Perfect Model Semantics, Proc. 5th ICLP, MIT Press, 1081–1096, 1988.
Sagonas, K., Swift, T., Warren, D., Freire, J., Rao, P., The XSB System, Version 2.0, Programmer’s Manual, 1999.
Sandhu, R., Ferraiolo, D., and Kuhn, R., The NIST Model for Role-Based Access Control: Towards a Unified Standard, Proc. 4th ACM Workshop on Role-Based Access Control, 47–61, 2000.
Ullman, J., Principles of Database and Knowledge-Base Systems: Volume 1, Computer Science Press, 1990.
Van Gelder, A., Ross, K., and Schlipf, J., The Well-Founded Semantics for General Logic Programs, J. ACM, 38(3), 620–650, 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Barker, S. (2002). Access Control for Deductive Databases by Logic Programming. In: Stuckey, P.J. (eds) Logic Programming. ICLP 2002. Lecture Notes in Computer Science, vol 2401. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45619-8_5
Download citation
DOI: https://doi.org/10.1007/3-540-45619-8_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43930-1
Online ISBN: 978-3-540-45619-3
eBook Packages: Springer Book Archive