Access controls for federated database environments - taxonomy of design choices

  • W. Eβmayr
  • F. Kastner
  • S. Preishuber
  • G. Pernul
  • A M. Tjoa
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)


We provide a short survey on the terminology of database security in database federations and give, as the main task, a taxonomy of the major design choices concerning access control in database federations. The taxonomy is organized in the categories granularity, authorization, and access control. Additionally, the impact of distribution, heterogeneity and autonomy, three characteristics of database federations, is examined for each of the design choices.


Database security discretionary access controls federated database systems object-oriented database systems 


  1. Atwood, T., Duhl, J., Ferran, G., Loomis, M., and Wade, D. (1993) The Object Database Standard: ODMG-93, Release 1.1. Morgan Kaufmann Publishers, San Francisco, California.Google Scholar
  2. Bertino, E., Kim, W., Rabitti, F. and Woelk, D. (1991) A Model of Authorization for Next-Generation Database Systems. ACM ToDS, Vol. 16, No. 1.Google Scholar
  3. Fernandez, E.B., Gudes, E. and Song, H. (1994) A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. on Knowl. & Data Eng., Vol. 6, No. 2.Google Scholar
  4. Jonscher, D. and Dittrich, K.R. (1993) Access Control for Database Federations. DBTA Workshop on Interoperablity of Database Systems and Database Applications, Fribourg.Google Scholar
  5. Jonscher, D. and Dittrich, K.R. (1994) An Approach for Building Secure Database Federations. Proc. 20th VLDB Conference, Santiago, Chile.Google Scholar
  6. Morgenstern, M., Lunt, T.F., Thuraisingham, B. and Spooner, D.L. (1992) Security Issues in Federated DBSs: Panel Contributions. Proc. of the Working Conference of the IFIP WG 11.3 on Database Security.Google Scholar
  7. Oliver, M.S. (1994) A Multilevel Secure Federated Database. Proc. of the Working Conference of the IFIP WG 11.3 on Database Security.Google Scholar
  8. Pernul, G. (1992) Canonical Security Modeling for Federated Databases. Proc. of IFIP TC2/WG 2.6 Conf. on Semantics of Interoperable Database Systems (DS’S), Lorne, Australia, Nov. 1992.Google Scholar
  9. Pernul, G. (1994) Database Security. In: Advances in Computers, Vol.38, pp. 1–72. (M. C. Yovits, ed.). Academic Press.Google Scholar
  10. Rusinkiewicz, M., Sheth, A.P. and Karabatis, G. (1991) Specifying Interdatabase Dependencies in a Mutlidatabase Environment. IEEE Computer, Dec. 1991.Google Scholar
  11. Sheth, A.P. and Larson, J.A. (1990) Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases. ACM Computing Surveys, Vol. 22, No. 3.Google Scholar
  12. Thuraisingham, B. (1994) Security Issues for Federated Database Systems. Computers & Security, Vol. 13, No. 6.Google Scholar
  13. Wang, C.Y. and Spooner, D.L. (1987) Access Control in a Heterogenous Distributed Database Management System. Proc. Sixth Symp. on Reliability in Distributed Software and Database Systems, IEEE Computer Society Press.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 1995

Authors and Affiliations

  • W. Eβmayr
    • 1
  • F. Kastner
    • 1
  • S. Preishuber
    • 1
  • G. Pernul
    • 2
  • A M. Tjoa
    • 3
  1. 1.Research Institute for Applied Knowledge ProcessingSoftwarepark HagenbergHagenbergAustria
  2. 2.Institute of Applied Computer Science and Information SystemsUniversity of ViennaViennaAustria
  3. 3.Institute of Software TechnologyTechnical University of ViennaViennaAustria

Personalised recommendations