Abstract
The usefulness of data largely depends on its correctness, which is determined by the extent to which the data reflects the real-world and universe of discourse. Since the real world is constantly changing, it follows that data must constantly be changed. Since an integrity violation could occur when information is wrongfully changed, changes should only be entrusted to trustworthy users. The changes must, furthermore, occur according to business rules. This type of control falls within the domain of an access control service. This paper investigates activities involved to enforce semantic integrity in relational database environments, particularly those where access is controlled according to a role-based paradigm.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35586-3_46
Chapter PDF
Similar content being viewed by others
References
Reinhardt A. Botha and Jan H.P. Eloff. Separation of duties for access control enforcement in workflow environments. IBM Systems Journal, 40(3):666–682, 2001.
Stefano Ceri and Raghu Ramakrishnan. Rules in database systems. ACM Computing Surveys, 28(1):109–111, March 1996.
ISO 7498–2: Information Processing Systems — Open System Interconnection — Basic Reference Model — Part 2: Security Architecture, 1989.
ANSI/ISO/IEC 7075–2:99 ISO International Standard: Database Language SQL- Part 2: Foundation (SQL/Foundation), September 1999.
F. Leyman and D. Roller. Production Workflow: Concepts and Techniques. Prentice-Hall, 2000.
J.D. Moffett. Control principles and role hierarchies. In Proceedings of 3rd ACM Workshop on Role-based Access Control, pages 63–69, 22–23 Oct 1998.
Amihai Motro. Integrity = validity + completeness. ACM Transactions on Database Systems, 14(4):480–502, December 1989.
N. W. Paton and O. DÃaz. Active database systems. ACM Computing Surveys, 31(1): 63–103, 1999.
R.S. Sandhu, E. J. Coyne, H. L. Fenstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, Feb 1996.
L. Weinstein and P. Neumann. Inside risks: Internet risks. Communication of ACM, 43(5):144, March 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Botha, R.A. (2002). Towards Semantic Integrity in Relational Databases. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds) Security in the Information Society. IFIP Advances in Information and Communication Technology, vol 86. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35586-3_23
Download citation
DOI: https://doi.org/10.1007/978-0-387-35586-3_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1026-7
Online ISBN: 978-0-387-35586-3
eBook Packages: Springer Book Archive