The semantic data model for security: representing the security semantics of an application

Data security requirements go beyond traditional access control considerations to include relationships among data that must be protected. The author extends the data-modeling concepts to include the secrecy properties of data. The semantic data model for security (SDMS) is proposed as the vehicle for users, database designers and security officers to analyze and understand the security requirements of the application domain. The model aids in analyzing data security requirements and database designs by providing an easy-to-comprehend representation scheme. SDMS can represent a full range of security semantics of an application.<<ETX>>

[1]  G. W. Smith Identifying and representing the security semantics of an application , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[2]  Catherine D. Jensen,et al.  SDDM-a prototype of a distributed architecture for database security , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.

[3]  Richard D. Graubart,et al.  The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.

[4]  Michael L. Brodie On the Development of Data Models , 1982, On Conceptual Modelling.

[5]  David W. Shipman,et al.  The functional data model and the data languages DAPLEX , 1981, TODS.

[6]  B. Dillaway,et al.  A practical design for a multilevel secure database management system , 1986 .

[7]  Lois M. L. Delcambre,et al.  Constraint analysis for specifying perspectives of class objects , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.

[8]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[9]  Susan Darling Urban ALICE: an assertion language for integrity constraint expression , 1989, [1989] Proceedings of the Thirteenth Annual International Computer Software & Applications Conference.

[10]  Serge Abiteboul,et al.  IFO: A Formal Semantic Database Model , 1987, ACM Trans. Database Syst..

[11]  John P. L. Woodward Exploiting the Dual Nature of Sensitivity Labels , 1987, 1987 IEEE Symposium on Security and Privacy.

[12]  Dennis McLeod,et al.  Database description with SDM: a semantic database model , 1981, TODS.

[13]  Peter P. Chen The entity-relationship model: toward a unified view of data , 1975, VLDB '75.

[14]  Matthew Morgenstern,et al.  Security and inference in multilevel database and knowledge-base systems , 1987, SIGMOD '87.

[15]  W. Shipman David,et al.  The functional data model and the data language DAPLEX , 1988 .

[16]  Matthew Morgenstern,et al.  Controlling logical inference in multilevel database systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[17]  Neil C. Rowe Inference-security analysis using resolution theorem-proving , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.

[18]  Stanley Y. W. Su,et al.  SAM*: A Semantic Association Model for Corporate and Scientific/Statistical Databases , 1983, Inf. Sci..

[19]  T.F. Lunt,et al.  A near-term design for the SeaView multilevel database system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[20]  Cristi Garvey,et al.  ASDViews (relational databases) , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[21]  Thomas H. Hinke,et al.  Inference aggregation detection in database management systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.