Secure Database Design

نویسندگان

  • Bibhu D. Sahoo
  • M. Balaram Prasad
چکیده

The most commercially available database provides security facility for a single table. However the situation has been changed, as enterprises move from local database to information backbone composed of cooperating heterogeneous database and then direct sharing of information between enterprise on the Internet. A strict security measure at database level is essential for a secure database design. This paper describes the secure SQL features as propounded by Winslett et al[1] which is an extension of SQL[4,5,6] .The object oriented model are more complex than relational model, and object orientation is not based on a formal mathematical model like relational model. For this reason the model for secure object oriented database are complex than the relational secure database model. For a object-oriented database, separate security assumption is to be made about the object orientation model. A discussion has been presented about the different security aspect of object-oriented database and relational database and finally it compares the security measures of both the approaches. A brief discussion is presented on security and user authorization in SQL2. It also indicates various choices that one may implement while designing a secure database.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

Secure Database Development

DEFINITION This entry considers how to build secure database system software. In particular, it describes how to build a general-purpose database management system where security is an important design parameter. For the database community the words secure database design may refer to the schema design to produce a database for a specific application with some level of security properties. Ther...

متن کامل

Security Constraint Processing in a Multilevel Secure Distributed Database Management System

In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification p...

متن کامل

Future Trends in Secure Chip Data Management

Secure chips, e.g. present in smart cards, TPM, USB dongles are now ubiquitous in applications with strong security requirements. Secure chips host personal data that must be carefully managed and protected, thus requiring embedded data management techniques. However, secure chips have severe hardware constraints which make traditional database techniques irrelevant. We previously addressed the...

متن کامل

Towards the Design and Implementation of a Multilevel Secure Deductive Database Management System

In this paper we describe a preliminary design and implementation of a multilevel secure deductive database management system (MLSIDEDBMS). In particular, logic as a dara model for multilevel databases, reasoning across security levels, architectural issues for an MLSIDEDBMS, and a prototype implementation are discussed.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007