Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
The NTree: a two dimension partial order for protection groups
Sandhu R. ACM Transactions on Computer Systems6 (2):197-222,1988.Type:Article
Date Reviewed: Feb 1 1989

Grouping of users for authorization purposes is an important problem from a practical point of view, since it can have a significant effect on the efficiency and ease of use (and therefore on the degree of security) of a computer security system. This clearly written paper describes an interesting way to define user groups so that

  • resources can be isolated for different users;

  • resources can be shared by different users;

  • use of resources can be conveniently supervised;

  • one can determine efficiently if a group is included in another group; and

  • it is possible to reduce the number of explicit access decisions that have to be made by users.

The proposed grouping is based on data structures called ntrees, which are subsets of the partial orders of dimension 2. By restricting their dimension to two, the theory of these structures is made rather simple, but they are still powerful enough to describe important practical situations. More specifically, ntrees are partial orders made of forests of mutually disjoint rooted trees or inverted rooted trees or obtained by refining an ntree. Refining consists of developing a node into a set of nodes, which is a useful way to introduce more detail in a top-down manner; i.e., a single ordering of groups can be made more specific by splitting some of the groups and adding an order to the resulting subgroups. Refinement does not increase the dimension of ntrees. Two integers, l[g] and r[g], are assigned to each group g and represent the positions of group g in L and R, respectively (L and R denote left-to-right and right-to-left preorder traversal).

Another operation is contracting a subset of an ntree. This allows the user to delete groups that are no longer needed and results in a simpler ntree. Addition of new groups to an existing ntree is also possible (and of practical value in adapting to changing conditions). A rather complex way of keeping l[g] and r[g] constant is described; it uses a place holder branch in the partial order.

The paper should be of interest to researchers in data security. System designers may also get some good ideas from it. A few more examples of applications would have been welcome. Some of the practical issues concerning grouping of users have been discussed in chapter 7 of Fernandez et al. [1]. This paper develops a theoretical foundation that should be valuable to future researchers.

Reviewer:  E. B. Fernandez Review #: CR112632
1) Fernandez, E. B.; Summers, R. C.; and Wood, C.Database security and integrity. Addison-Wesley, Reading, MA, 1981.
Bookmark and Share
  Featured Reviewer  
 
Security, Integrity, And Protection (H.2.0 ... )
 
 
Graph And Tree Search Strategies (I.2.8 ... )
 
 
Search Process (H.3.3 ... )
 
 
Security (K.6.m ... )
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Views for multilevel database security
Denning D., Akl S., Heckman M., Lunt T., Morgenstern M., Neumann P., Schell R. IEEE Transactions on Software Engineering SE-13(2): 129-140, 1987. Type: Article
Feb 1 1988
Computer security: a comprehensive controls checklist
Wood C., Banks W., Guarro S., Garcia A., Hampel V., Sartorio H., Wiley-Interscience, New York, NY, 1987. Type: Book (9789780471847953)
Feb 1 1988
Incorporating access control in forms systems
Yeo G. Computers and Security 4(2): 109-122, 1985. Type: Article
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy