Databases Reference
In-Depth Information
and the profile vectors of the user request and the corresponding counterparts
of each node N involved in the top-down traversal recursively. The comparison
between N and SMR during the traversal results in the following cases.
If ( SMR
( U is disjoint with N ): The dis-
joint relationship implies that all the moving objects stored at the subtree
rooted at N are not within the spatiotemporal region or do not meet the
profile condition for the user request SMR . Regardless of the existence of
authorizations for the requester at N , the moving objects stored at the
subtree rooted at N are not within the user's interests. Therefore, the
traversal stops regardless of the existence of overlaid authorizations.
is disjoint with N )
Else if ( SMR overlaps with N )
( SMR overlaps with N )): If there
is no authorization for the requester which is overlaid on N , the level of
node decides the evaluation result. If N is a non-leaf node, access control
decision cannot be made at the node N because there is a possibility that
a relevant authorization may be overlaid on a descendent node of N .Thus,
the evaluation process will be performed for all the children nodes of N .
If N is a leaf node, we reject the access request because there exists no
relevant authorization during the traversal.
If there exist an authorization for the requester among the overlaid au-
thorizations in N , the node level also decides the decision as well. If N
is a non-leaf node, although all the moving objects stored at the subtree
rooted at N are authorized, the user wants to retrieve a subset of moving
objects whose locations are within SMR and whose profiles are enclosed
by SMR . Therefore, for the subtree rooted at N , we retrieve moving
objects whose location overlaps with SMR and whose profile condition
overlaps with SMR . Thus, evaluation is delayed to each child node of
N , and the same comparison will occur recursively. If N is a leaf node,
because we overlay authorizations on a leaf-node in an enclosing case as
well as overlapping case, not all of the moving objects in N are autho-
rized. Thus, for all the authorizations overlaid on N , return the moving
objects that are located within the intersection area between α and U
and whose profiles are overlapped with the bitwise AND operation of α
and U .
Else, implying the case of ( SMR encloses N )
( SMR encloses N ):
If there exists at least one relevant authorization for the requester on N ,
thenodelevelof N decides the access control decision. If N is a non-leaf
node, because the spatiotemporal extents and profiles stored at the subtree
rooted at N are authorized, all the moving objects stored at leaf nodes
of the subtree rooted at N are allowed to be accessed by the requester.
Therefore, there is no need to evaluate authorizations on the subtree rooted
at N . In addition, spatiotemporal and profile vector comparisons would not
be required because all the moving objects stored at the subtree rooted
at N are within the user's interests. If N is a leaf node, some of the
moving objects in N may not be authorized if the overlaid authorizations
Search WWH ::




Custom Search