Event Detection in Multilevel Secure Active Databases
نویسندگان
چکیده
The event-condition-action paradigm (also known as triggers or rules) is a powerful technology. It gives a database “active” capabilities – the ability to react automatically to changes in the database or in the environment. One potential use of this technology is in the area of multilevel secure (MLS) data processing, such as, military, where the subjects and objects are classified into different security levels and mandatory access control rules govern who has access to what. Although a lot of research appears in MLS databases, not much work has been done in the area of MLS active databases. In this paper, we look at one very important aspect of an MLS active database – event detection. An MLS rule, like any other object in an MLS database, is associated with a security level. Events in an MLS database are also associated with security levels. Since an MLS rule can be triggered by an event that is at a different security level than the rule, we cannot use the event detection techniques designed for non-MLS active databases. Using such techniques cause illegal information flow. Our goal is to propose new algorithms that prevent such illegal information flow. We first present an approach to detect primitive events – events that cannot be decomposed. Different types of primitive events can be combined using the event composition operators to form composite events. We also describe how to detect composite events using event graphs in an MLS database.
منابع مشابه
Multilevel Secure Rules and Its Impact on the Design of Active Database Systems
The event-condition-action paradigm (also known as triggers or rules) gives a database “active” capabilities – the ability to react automatically to changes in the database or in the environment. One potential use of this technology is in the area of multilevel secure (MLS) data processing, such as, military, where the subjects and objects are classified into different security levels and manda...
متن کاملAnalysis of Challenges in the Design and Development of Multi-Level Secure Databases
Database security mainly deal with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve Privilege Abuse, Weak Authentication, Weak Audit Trails and Operating System Vulnerabilities. To make the security least compromised; all users are required to follow the rules set up by Database Administrator. These rules are said to be Mandatory ...
متن کاملA Fair Locking Protocol for Multilevel Secure Databases
Most concurrency control algorithms for multilevel secure databases based on kernelized architecture prevent covert channels between transactions at different security levels by preempting the high security transaction in the event of a data conflict with a lower security transaction. In environments with moderate to high levels of contention between low and high security transactions, this can...
متن کاملMultilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models
Traditional database security is made more complex by the addition of rules to the data model. The security policy must control access privileges and accessibility for rule descriptions, executing rules, and database transitions (events). In this paper we extend the multilevel secure relational model to capture the functionality required of an active database, i. e. a database with production r...
متن کاملPerformance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
Role-Based Access Control: A Multi-Dimensional View p. 54 Panel: Reexamining Assurance p. 64 Plenary Panel: Secure System Composition p. 66 Secure System Composition: Five Practical Initiatives p. 67 Architectural Impact on Performance of a Multilevel Database System p. 76 Benchmarking Multilevel Secure Database Systems Using the MITRE Benchmark p. 86 Organizing MLS Databases from a Data Modeli...
متن کامل