The personal model of data towards a privacy oriented information system

A general report is presented on an approach problem of privacy-oriented information systems. The report is based on extensive research experiences in specifying the structure of such a system, including the underlying data model and the privacy policy, as well as on the insight gained from a prototype implementation of selected parts of the specification. The system is called DORIS (datenschutz-orientiertes informations system). While the model is basically object-oriented, it is possible conveniently to describe an application by non-first-normal-form tuples and relations, and the data-manipulation language is high-level and relational. An expression is evaluated in three stages: navigation in the set of surrogates of persons, asking for knowledge, and finally normalization, prime value processing and output preparation. A prototype implementation of selected parts of the model is based on a kernel concept.<<ETX>>

[1]  Klaus R. Dittrich,et al.  Ein universelles Konzept zum flexiblen Informationsschutz in und mit Rechensystemen , 1983, Informatik-Fachberichte.

[2]  David Maier,et al.  Making smalltalk a database system , 1984, SIGMOD '84.

[3]  Dorothy E. Denning Cryptographic Checksums for Multilevel Database Security , 1984, 1984 IEEE Symposium on Security and Privacy.

[4]  Gio Wiederhold,et al.  Framework for the Security Component of an Ada DBMS , 1986, VLDB.

[5]  John M. Rushby,et al.  Design and verification of secure systems , 1981, SOSP.

[6]  Lawrence Snyder,et al.  Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.

[7]  Richard Graubart,et al.  A Preliminary Naval Surveillance DBMS Security Model. , 1982, S&P 1982.

[8]  Henry F. Korth Extending the Scope of Relational Languages , 1986, IEEE Software.

[9]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[10]  Ehud Gudes The Design of a Cryptography Based Secure File System , 1980, IEEE Transactions on Software Engineering.

[11]  David K. Gifford Cryptographic sealing for information secrecy and authentication , 1982, CACM.

[12]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[13]  Billy G. Claybrook Using Views in a Multilevel Secure Database Management System , 1983, 1983 IEEE Symposium on Security and Privacy.

[14]  Richard D. Graubart,et al.  The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.

[15]  Selim G. Akl,et al.  Views for Multilevel Database Security , 1986, 1986 IEEE Symposium on Security and Privacy.

[16]  Joachim Biskup,et al.  Analysis of the Privacy Model for the Information System DORIS , 1988, DBSec.

[17]  Michael Stonebraker,et al.  The Case for Shared Nothing , 1985, HPTS.

[18]  J. D. Uiiman,et al.  Principles of Database Systems , 2004, PODS 2004.

[19]  Joachim Biskup,et al.  Privacy Respecting Permissions and Rights , 1988, DBSec.

[20]  Dorothy E. Denning,et al.  A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.

[21]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[22]  Irving L. Traiger,et al.  Views, authorization, and locking in a relational data base system , 1975, AFIPS '75.

[23]  Richard J. Lipton,et al.  A System Architecture to Support a Verifiably Secure Multilevel Security System , 1980, 1980 IEEE Symposium on Security and Privacy.

[24]  Carl E. Landwehr,et al.  A Formal Statement of the MMS Security Model , 1984, 1984 IEEE Symposium on Security and Privacy.

[25]  Bradford W. Wade,et al.  An authorization mechanism for a relational database system , 1976, TODS.

[26]  Carl E. Landwehr,et al.  A security model for military message systems , 1984, TOCS.

[27]  Jeffrey D. Ullman,et al.  Principles of Database Systems , 1980 .

[28]  David A. Bonyun The Secure Relational Database Management System Kernel: Three Years After , 1980, 1980 IEEE Symposium on Security and Privacy.

[29]  Selim G. Akl,et al.  Checking Classification Constraints for Consistency and Completeness , 1987, 1987 IEEE Symposium on Security and Privacy.

[30]  Henry M. Levy,et al.  Capability-Based Computer Systems , 1984 .

[31]  William A. Wulf,et al.  HYDRA/C.Mmp, An Experimental Computer System , 1981 .

[32]  Catherine A. Meadows The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels , 1987, 1987 IEEE Symposium on Security and Privacy.

[33]  Yi-Shiung Yeh,et al.  Cryptographic Relational Algebra , 1982, 1982 IEEE Symposium on Security and Privacy.

[34]  Peter Dadam,et al.  A DBMS prototype to support extended NF2 relations: an integrated view on flat tables and hierarchies , 1986, SIGMOD '86.

[35]  Michael Stonebraker,et al.  Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.

[36]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[37]  Jim Gray,et al.  An approach to decentralized computer systems , 1986, IEEE Transactions on Software Engineering.

[38]  David L. Wells,et al.  Modified Architecture for the Sub-Keys Model , 1983, 1983 IEEE Symposium on Security and Privacy.

[39]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[40]  Klaus R. Dittrich,et al.  Protection in the OSKAR Opereting System: Goals, Concepts, Conseqeuences , 1982, 1982 IEEE Symposium on Security and Privacy.

[41]  Michael Stonebraker,et al.  Access control in a relational data base management system by query modification , 1974, ACM '74.

[42]  Michael Stonebraker,et al.  The design of POSTGRES , 1986, SIGMOD '86.

[43]  Reind P. van de Riet,et al.  Answering queries without revealing secrets , 1983, TODS.

[44]  Stanley R. Ames Security Kernels: A Solution or a Problem? , 1981, IEEE Symposium on Security and Privacy.

[45]  Joachim Biskup,et al.  The personal model of data: Towards a privacy-oriented information system , 1988, Comput. Secur..

[46]  Michael Stonebraker,et al.  The INGRES protection system , 1976, ACM '76.

[47]  Mario Tokoro,et al.  An Object-Oriented Approach to Knowledge Systems , 1984, FGCS.