摘要 |
PURPOSE:To completely protect the secrecy of a data base by exchanging a protocol relating to the possesor of an access right between a request source node and a provision side node at the time of an access. CONSTITUTION:When the applied program 2A of the node 1A issues an operation instruction for making access to the data base 3 of the node 1B, a decentralized data base control part 5 analyzes the node name, thereafter, obtains the name of the possesor corresponding to the node name 1B from a decentralized data base access right possesor table 8A in a decentralized data base possesor name transmitting part and transmits the possesor name. The data base processing part 6 of the node 1B compares the received possesor name with the contents of the registration of the data base access right possesor table 9B of the node of its own. When they coincide, the access right is applied to the program 2A. Thereafter, the control part 5 transmits the operation instruction, the processing part 6 analyzes the operation instruction in the node 1B and the input and output processing part of the node of its own processes the input and output to the data base 3. |