2003
DOI: 10.1007/s00236-002-0095-2
|View full text |Cite
|
Sign up to set email alerts
|

A top-down proof procedure for generalized data dependencies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2004
2004
2012
2012

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
4
0
1
Order By: Relevance
“…It relies on an external constraint solver over reals to handle constraints. Three dierent chases have been implemented : (Beeri and Vardi, 1984), (Maher and Srivastava, 1996) and (Coulondre, 2003). Given a logical formalization of an ac written using dependencies, the prototype If a role inherits another role and that role is in SSD with a third one, then the inheriting role is in SSD with the third one.…”
Section: Sample Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…It relies on an external constraint solver over reals to handle constraints. Three dierent chases have been implemented : (Beeri and Vardi, 1984), (Maher and Srivastava, 1996) and (Coulondre, 2003). Given a logical formalization of an ac written using dependencies, the prototype If a role inherits another role and that role is in SSD with a third one, then the inheriting role is in SSD with the third one.…”
Section: Sample Resultsmentioning
confidence: 99%
“…We have implemented the proof procedures for dependencies presented in (Beeri and Vardi, 1984), (Maher and Srivastava, 1996) and (Coulondre, 2003) to validate our approach. As shown in section 4.6, our prototype allows automatizing the consistency checking of Rbac policies and furnishing proof of previous results independently…”
Section: Formal Characterizationmentioning
confidence: 99%
“…• To investigates how the proof procedure for the implication problems, called chase (Biskup and Convent, 1991) and a new top-down proof procedure for generalized data dependencies (Coulondre, 2003) can be improved with the substitution paradigm.…”
Section: Discussionmentioning
confidence: 99%
“…In some cases, the new set has been treated completely and it does not have any redundant FD. In other cases, the new set has less size (considering both, attributes and FDs) than the original one and, consequently, can be treated more efficiently by other well known algorithms (Atzeni and Torlone, 1997;Biskup and Convent, 1991;Coulondre, 2003).…”
Section: A Pre-processing Transformation Based On the Substitution Pamentioning
confidence: 99%
“…Soit F l'ensemble des dépendances régissant l'exclusion mutuelle (section 5) ainsi que la dépendance f admin modélisant ce rôle particulier. Soit g : ssd(R 1 ,R 2 ),role(R 1 ),role(R 2 ) →⊥ la propriété que l'on veut savoir vérifiée "une contrainte d'exclusion mutuelle entre deux rôles quels qu'ils soient et l'existence d'un rôle administrateur rendent toute politique inconsistante" : 1) f admin : role(R) → hRole(administrateur, R), 2) f 1 : hRole(R 1 ,R 2 ),ssd(R 1 ,R 2 ) →⊥, 3) f 2 : hRole(R, R 1 ),hRole(R, R 2 ), ssd(R 1 ,R 2 ) →⊥, Les procédures de preuves (Maher et al, 1996;Beeri et al, 1984;Coulondre, 2003) que nous avons évoqué en section 3.2 permettent de répondre à ce type de problèmes, et prouvent sur cet exemple que effectivement F |= g, l'existence d'une contrainte d'exclusion mutuelle interdit la présence d'un rôle administrateur.…”
Section: Exempledevérification Automatiséeunclassified