RECONCILING FOREIGN KEY REFERENCES AND TABLE SECURITY POLICIES

Some database tables include a relational field, where a record of the table stores a foreign-key reference value that identifies a related record of a second table. While fulfilling a request comprising a query over the database, the system may identify a context of the request, wherein the context...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: EL HUSSEINI, Ahmad Mahdi, GALL, Michael, ANDERSON, Jeffrey, SADASIVAM, Ganapathi Subramanian, BLAABERG, Lars Dragheim
Format: Patent
Sprache:eng ; fre ; ger
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator EL HUSSEINI, Ahmad Mahdi
GALL, Michael
ANDERSON, Jeffrey
SADASIVAM, Ganapathi Subramanian
BLAABERG, Lars Dragheim
description Some database tables include a relational field, where a record of the table stores a foreign-key reference value that identifies a related record of a second table. While fulfilling a request comprising a query over the database, the system may identify a context of the request, wherein the context is supplemental to the query, and wherein the context relates to the relational field. For example, a security policy may permit a requester to query the first table, but restrict the requester from accessing the second table that the relational field of the first table references, where dereferencing the relational field may cause unexpected results. Instead, the system may evaluate the context of the request, and may fulfill the request based on the context by providing a response that substitutes, for the value that references the second table, a substitute value that does not reference the second table.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3458979A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3458979A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3458979A13</originalsourceid><addsrcrecordid>eNrjZLALcnX293P29PH0c1dw8w9y9XT3U_B2jVQIcnVzDXL1c3YNVnD0c1EIcXTycVUIdnUODfIMiVQI8PfxdPZ0DeZhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGuAcYmphaW5paOhsZEKAEABrkp1A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>RECONCILING FOREIGN KEY REFERENCES AND TABLE SECURITY POLICIES</title><source>esp@cenet</source><creator>EL HUSSEINI, Ahmad Mahdi ; GALL, Michael ; ANDERSON, Jeffrey ; SADASIVAM, Ganapathi Subramanian ; BLAABERG, Lars Dragheim</creator><creatorcontrib>EL HUSSEINI, Ahmad Mahdi ; GALL, Michael ; ANDERSON, Jeffrey ; SADASIVAM, Ganapathi Subramanian ; BLAABERG, Lars Dragheim</creatorcontrib><description>Some database tables include a relational field, where a record of the table stores a foreign-key reference value that identifies a related record of a second table. While fulfilling a request comprising a query over the database, the system may identify a context of the request, wherein the context is supplemental to the query, and wherein the context relates to the relational field. For example, a security policy may permit a requester to query the first table, but restrict the requester from accessing the second table that the relational field of the first table references, where dereferencing the relational field may cause unexpected results. Instead, the system may evaluate the context of the request, and may fulfill the request based on the context by providing a response that substitutes, for the value that references the second table, a substitute value that does not reference the second table.</description><language>eng ; fre ; ger</language><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190327&amp;DB=EPODOC&amp;CC=EP&amp;NR=3458979A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190327&amp;DB=EPODOC&amp;CC=EP&amp;NR=3458979A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>EL HUSSEINI, Ahmad Mahdi</creatorcontrib><creatorcontrib>GALL, Michael</creatorcontrib><creatorcontrib>ANDERSON, Jeffrey</creatorcontrib><creatorcontrib>SADASIVAM, Ganapathi Subramanian</creatorcontrib><creatorcontrib>BLAABERG, Lars Dragheim</creatorcontrib><title>RECONCILING FOREIGN KEY REFERENCES AND TABLE SECURITY POLICIES</title><description>Some database tables include a relational field, where a record of the table stores a foreign-key reference value that identifies a related record of a second table. While fulfilling a request comprising a query over the database, the system may identify a context of the request, wherein the context is supplemental to the query, and wherein the context relates to the relational field. For example, a security policy may permit a requester to query the first table, but restrict the requester from accessing the second table that the relational field of the first table references, where dereferencing the relational field may cause unexpected results. Instead, the system may evaluate the context of the request, and may fulfill the request based on the context by providing a response that substitutes, for the value that references the second table, a substitute value that does not reference the second table.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLALcnX293P29PH0c1dw8w9y9XT3U_B2jVQIcnVzDXL1c3YNVnD0c1EIcXTycVUIdnUODfIMiVQI8PfxdPZ0DeZhYE1LzClO5YXS3AwKbq4hzh66qQX58anFBYnJqXmpJfGuAcYmphaW5paOhsZEKAEABrkp1A</recordid><startdate>20190327</startdate><enddate>20190327</enddate><creator>EL HUSSEINI, Ahmad Mahdi</creator><creator>GALL, Michael</creator><creator>ANDERSON, Jeffrey</creator><creator>SADASIVAM, Ganapathi Subramanian</creator><creator>BLAABERG, Lars Dragheim</creator><scope>EVB</scope></search><sort><creationdate>20190327</creationdate><title>RECONCILING FOREIGN KEY REFERENCES AND TABLE SECURITY POLICIES</title><author>EL HUSSEINI, Ahmad Mahdi ; GALL, Michael ; ANDERSON, Jeffrey ; SADASIVAM, Ganapathi Subramanian ; BLAABERG, Lars Dragheim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3458979A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2019</creationdate><toplevel>online_resources</toplevel><creatorcontrib>EL HUSSEINI, Ahmad Mahdi</creatorcontrib><creatorcontrib>GALL, Michael</creatorcontrib><creatorcontrib>ANDERSON, Jeffrey</creatorcontrib><creatorcontrib>SADASIVAM, Ganapathi Subramanian</creatorcontrib><creatorcontrib>BLAABERG, Lars Dragheim</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>EL HUSSEINI, Ahmad Mahdi</au><au>GALL, Michael</au><au>ANDERSON, Jeffrey</au><au>SADASIVAM, Ganapathi Subramanian</au><au>BLAABERG, Lars Dragheim</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>RECONCILING FOREIGN KEY REFERENCES AND TABLE SECURITY POLICIES</title><date>2019-03-27</date><risdate>2019</risdate><abstract>Some database tables include a relational field, where a record of the table stores a foreign-key reference value that identifies a related record of a second table. While fulfilling a request comprising a query over the database, the system may identify a context of the request, wherein the context is supplemental to the query, and wherein the context relates to the relational field. For example, a security policy may permit a requester to query the first table, but restrict the requester from accessing the second table that the relational field of the first table references, where dereferencing the relational field may cause unexpected results. Instead, the system may evaluate the context of the request, and may fulfill the request based on the context by providing a response that substitutes, for the value that references the second table, a substitute value that does not reference the second table.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3458979A1
source esp@cenet
title RECONCILING FOREIGN KEY REFERENCES AND TABLE SECURITY POLICIES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T05%3A58%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=EL%20HUSSEINI,%20Ahmad%20Mahdi&rft.date=2019-03-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3458979A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true