Browser unable to execute script; please use the site map to navigate the site.

Security Policies in Replicated and Autonomous Databases

Gudes and Olivier


(Citation)Citation information

E. Gudes and M. S. Olivier. “Security Policies in Replicated and Autonomous Databases”. In: Database Security XII: Status and Prospects. Ed. by S. Jajodia. Kluwer, 1999, pp. 93–107


Autonomous object databases are becoming important in the Internet world of today and involve integration of several local databases. Such databases support local access for transactions and queries and local control over authorization of classes and objects. At the same time, these database objects are often replicated in various sites and are available for access by global queries and transactions. Such global access, which may involve a global query optimizer, is required to handle conflicts between the local authorizations of replicated objects, but give consistent results regardless of site dependent optimizations.

The paper uses previous models for object-based authorization, and extends them with policies to handle conflicts between local and global authorizations. It also discusses object migration and security administration. The problem of providing autonomy in a consistent way is discussed extensively.

(Full text; password required)Full text

A pre- or postprint of the publication is available at
Note that a username and password are required to download the full text. (Why?) Please e-mail me and I will send you a username and password.

(Authoritative version on publisher's site)Definitive version

The definitive version of the paper is available from the publisher.
DOI: 10.1007/978-0-387-35564-1_6

(BibTeX record)BibTeX reference

author={Ehud Gudes and Martin S Olivier},
title={Security Policies in Replicated and Autonomous Databases},
editor={Sushil Jajodia},
booktitle={Database Security XII: Status and Prospects},
year={1999} )