Research Directions in Database Security by Teresa F. Lunt (auth.), Teresa F. Lunt (eds.)

By Teresa F. Lunt (auth.), Teresa F. Lunt (eds.)

Many advertisement and security purposes require a database method that protects info of alternative sensitivities whereas nonetheless permitting clients of other clearances to entry the approach. This publication is a set of papers overlaying facets of the rising safeguard know-how for multilevel database platforms. It comprises studies on such landmark platforms as SeaView, LDV, ASD, safe Sybase, the UNISYS safe allotted approach, and the safe entity-relationship approach GTERM. a lot of the study is anxious with the relational version, even if safety for the entity-relationship and object-oriented versions of knowledge also are mentioned. as the box is so new, it's been tremendous tricky to benefit concerning the examine occurring during this region, earlier. This e-book might be helpful to researchers and procedure designers in database platforms and laptop safeguard. it is going to even be of curiosity to info clients and custodians who're excited by the protection in their details. This e-book is additionally used as a textual content for a complicated themes path on laptop protection in a working laptop or computer technology curriculum.

Show description

By Teresa F. Lunt (auth.), Teresa F. Lunt (eds.)

Many advertisement and security purposes require a database method that protects info of alternative sensitivities whereas nonetheless permitting clients of other clearances to entry the approach. This publication is a set of papers overlaying facets of the rising safeguard know-how for multilevel database platforms. It comprises studies on such landmark platforms as SeaView, LDV, ASD, safe Sybase, the UNISYS safe allotted approach, and the safe entity-relationship approach GTERM. a lot of the study is anxious with the relational version, even if safety for the entity-relationship and object-oriented versions of knowledge also are mentioned. as the box is so new, it's been tremendous tricky to benefit concerning the examine occurring during this region, earlier. This e-book might be helpful to researchers and procedure designers in database platforms and laptop safeguard. it is going to even be of curiosity to info clients and custodians who're excited by the protection in their details. This e-book is additionally used as a textual content for a complicated themes path on laptop protection in a working laptop or computer technology curriculum.

Show description

Read Online or Download Research Directions in Database Security PDF

Best research books

Qualitative Inquiry and Research Design: Choosing Among Five Approaches (3rd Edition)

During this 3rd version of his bestselling textual content John W. Creswell explores the philosophical underpinnings, background, and key parts of every of 5 qualitative inquiry traditions: narrative study, phenomenology, grounded idea, ethnography, and case examine. In his signature obtainable writing type, the writer relates study designs to every of the traditions of inquiry.

Critical Infrastructure Protection Research: Results of the First Critical Infrastructure Protection Research Project in Hungary

This e-book provides contemporary learn within the acceptance of vulnerabilities of nationwide structures and resources which received unique realization for the severe Infrastructures within the final 20 years. The publication concentrates on R&D actions within the relation of serious Infrastructures targeting improving the functionality of providers in addition to the extent of defense.

Additional resources for Research Directions in Database Security

Example text

Thus, it is important that the operations as specified satisfy the security properties of the SeaView security model. We have formally verified that two of the database operations specified in the SeaView FTLS obey all SeaView security properties. The benefit we obtained from this exercise was enormous [WL89a]. During the process of performing the proofs, we found numerous areas in which our initial specification of SeaView operations was faulty, errors in the statement of SeaView security properties, and missing security properties that were needed in the model.

However, for a user to obtain access to a view, the user must be authorized for the reference mode on all referenced multilevel relations. This allows for the use of views to control discretionary access to subsets of a relation. The reference mode also allows for control over the use and propagation of views. Because a view may exclude certain attributes of the underlying multilevel relations and/or certain tuples by using a "where" clause, or may present only derived data such as a statistical computation on the data, views provide a flexible means for specifying discretionary access controls, including value-dependent, time-dependent, context-dependent, and history-dependent controls.

E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley. Element-level classification with Al assurance. Computers and Security, February 1988. [LDS+89] T. F. Lunt, D. E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley. Final report Vol. 2: The SeaView formal security policy model. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, 1989. [LSS+88a] T. F. Lunt, R. R. Schell, W. R. Shockley, M. Heckman, and D. Warren. A near-term design for the SeaView multilevel database system.

Download PDF sample

Rated 4.24 of 5 – based on 3 votes