Applicability of Temporal Data Models to Query Multilevel Security Databases: A Case Study
نویسنده
چکیده
In a multilevel security database there are multiple beliefs about a given real world object. The ability of a database model to accommodate multiple beliefs is termed polyinstantiation in the multilevel security literature. In this paper we remark that in an abstract sense polyinstantiation is a priori present in all models for temporal and spatial databases. In particular we investigate the applicability of the parametric model for temporal data to query multilevel security data and, as a case study, compare it to a model for multilevel security given by Winslett, Smith, and Qian. Disciplines Databases and Information Systems | Information Security | Systems Architecture This article is available at Iowa State University Digital Repository: http://lib.dr.iastate.edu/cs_techreports/86 Page 20 [LDS90] Lunt, T. F., D. E. Denning, R. R. Schell, M. Heckman, and W.R. Shockley. The Seaview security model. IEEE Transactions on Software Engineering, Vol 16, pp 593-607, 1990. [NG92] Nair, Sunil and Shashi K. Gadia. Algebraic optimization in a relational model for temporal databases, Proc. First International Conference on Information and Knowledge Management, pp 169-176, 1992. [PMP94] Pissinou, Niki, Kia Makki, and E. K. Park. Towards a framework for integrating secure models and temporal databases. Proc. of Third International Conference on Information and Knowledge Management, 1994, pp 280-287. [SW92] Smith K. and M. Winslett. Entity modeling in the MLS relational model. Proceedings of Eighteenth VLDB, pp 199-210, 1992. [Ta+93] Tansel, Abdullah, et al, Eds. Temporal Databases: Theory, Design, and Implementation. Benjamin/Cummings, Redwood City, California, 1993, pp 28-66. [WSQ94] Winslett, Marianne, Kenneth Smith, and Xialei Qian. Formal query languages for secure relational databases. ACM Transactions on Database Systems, Vol 19, 1994, pp 626-662.
منابع مشابه
Concept of a Value in Multilevel Security Databases
In this paper, we focus on a framework of multilevel security databases. We assume subjects form a hierarchy and they have varying beliefs about existence, identities, and other properties of objects. Every subject has an object space that represents its own belief about the real world. A subject is interested in not only query of objects in its own space, but also how they relate to objects be...
متن کاملAnalysis of Challenges in the Design and Development of Multi-Level Secure Databases
Database security mainly deal with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve Privilege Abuse, Weak Authentication, Weak Audit Trails and Operating System Vulnerabilities. To make the security least compromised; all users are required to follow the rules set up by Database Administrator. These rules are said to be Mandatory ...
متن کاملFuzzy multi-criteria selection procedures in choosing data source
Technology assessment and selection has a substantial impact on organizations procedures in regards to technology transfer. Technological decisions are usually made by a group of experts, and whereby integrity of these viewpoints to a single decision can be quite complex. Today, operational databases and data warehouses exist to manage and organize data with specific features and henceforth, th...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997