Mandatory Controls for Database Integrity
نویسنده
چکیده
Our goal is to develop a scienti c understanding of the kinds of mandatory controls needed to support data integrity. There is general consensus that integrity is an important problem and requires some kind of mandatory controls for its solution. At the same time, inspite of considerable e ort [17, 18, for instance], there is little consensus on what is meant by the two key terms: mandatory controls and data integrity. In this paper we outline our position on these issues and suggest avenues of research. Our fundamental claims are as follows.
منابع مشابه
Terminology, Criteria and System Architectures for Data Integrity
In response to the strawman document [9] we propose that trust be treated as synonymous with integrity rather than synonymous with con dence. We also propose that mandatory controls be taken to mean controls based on properties of the object and/or the subject. Label-based mandatory controls are then a special case of this more general notion. The TCSEC [11] presents criteria for establishing p...
متن کاملThe SeaView Security 593 Model
A multilevel database is intended to provide the security needed for database systems that contain data at a variety of classifications and serve a set of users having different clearances. This paper describes a formal security model for a such a system. The model is formulated in two layers, one corresponding to a reference monitor that enforces mandatory security, and the second an extension...
متن کاملThe SeaView Security
A multilevel database is intended to provide the security needed for database systems that contain data at a variety of classifications and serve a set of users having different clearances. This paper describes a formal security model for a such a system. The model is formulated in two layers, one corresponding to a reference monitor that enforces mandatory security, and the second an extension...
متن کاملDatabase Access Control Policies
As organizations increase their dependence on database systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. A truly comprehensive approach for data protection must include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics. The database security comm...
متن کاملThe Design of an Adaptive Intrusion Tolerant Database System
This paper presents the design of an adaptive intrusion tolerant database system, called AITDB. The goal of AITDB is to provide database applications with a stabilized level of data integrity and availability in face of attacks. Using a rule-based adaptation mechanism and a set of reconfiguration operators, AITDB automatically adapts itself to the dynamic changes of environment according to a s...
متن کامل