Concept of a Value in Multilevel Security Databases

نویسندگان

  • Jia Tao
  • Shashi Gadia
  • Tsz Shing Cheng
چکیده

In this paper, we focus on a framework of multilevel security databases. We assume subjects form a hierarchy and they have varying beliefs about existence, identities, and other properties of objects. Every subject has an object space that represents its own belief about the real world. A subject is interested in not only query of objects in its own space, but also how they relate to objects belonging to lower subjects. We introduce the concept of a skeleton that allows all cascading beliefs of a given object to be assembled in a way that is natural for users in multilevel security. Skeletons are treated as most primitive values in the model. In stored relations, tuples consist of skeletons, one for each attribute of the tuple. Any query related to this object would draw a subset of the tuple. Skeletons greatly simplifies query of cascading beliefs, the main preoccupation of a subject in multilevel security. Self-joins are largely reduced. Query is much more simplified compared to other models. We also show that the skeletons obey good algebraic identities which are a prerequisite for an SQL-like declarative algebraic query language. Depending upon their thought process, different users can formulate a query in variety of ways. The formalism of the model presented in this paper proves to reassure the users that queries that seem equivalent are indeed equivalent and therefore retrieve the same result. The operations are used freely without any fear of loss of information. Intricate details of algebraic operators introduced in this paper are meant to be absorbed by the system and not passed on to the users. Thus this paper lays stronger foundation for natural query of multilevel security data than existing works.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cover Story

Cover story has been a controversial concept for the last twenty years. This concept was first introduced in 1991 in the SEAVIEW project [2] as an explanation for the polyinstantiation technique used in multilevel databases, i.e. databases which support a multilevel security policy. To illustrate the concept of polyinstantiation, consider the example of multilevel relational database that conta...

متن کامل

A Bibliography and Index of Our Works on Belief Data: Concept of Error and Multilevel Security

In 1988 we initiated our work on belief data. The work proceeded in two phases: in the first phase we formalized the concept of error in everyday record keeping, and in the second phase we considered multilevel security. The purpose of this report is to create an awareness about our works on belief data and to serve as a guide for the following manuscripts. The first two manuscripts are on the ...

متن کامل

An Algebra for Belief Persistence in Multilevel Security Databases

In a multilevel security environment, the security levels form a hierarchy which is generally assumed to be a lattice. A user can see not only its own information, but also information belonging to lower users. In a multilevel security database, different users have different beliefs (versions of information) about the same real world object. In this paper we present a relational model SecDB fo...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Integrating Multilevel Security Policies in Multilevel Federated Database Systems

Federated database systems solve the problem of sharing information among independent entities. When building and operating such a federated database system, it is necessary to protect data. Because of heterogeneities among security systems of component databases an integration of them is essential, taking into account new security features of the federation itself. This paper describes a multi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/cs/0703103  شماره 

صفحات  -

تاریخ انتشار 2007