Database design and MLS DBMSs: an unhappy alliance?

Although much work has been performed in the areas of database design and MLS DBMSs, little has been done to marry the two areas together. It is shown that the implementation of a secure database design is not a trivial matter. Two MLS DBMSs, SWORD and SeaView, are used to demonstrate the problems of implementing simple secure application requirements.<<ETX>>

[1]  J. Thomas Haigh,et al.  The LDV Approach to Database Security , 1989, DBSec.

[2]  Simon R. Wiseman,et al.  Using SWORD for the Military Aircraft Command Example Database , 1993, DBSec.

[3]  Dorothy E. Denning,et al.  A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.

[4]  Günther Pernul,et al.  Security constraint processing during multilevel secure database design , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[5]  E. F. Codd,et al.  A relational model of data for large shared data banks , 1970, CACM.

[6]  E. F. CODD,et al.  A relational model of data for large shared data banks , 1970, CACM.

[7]  Simon R. Wiseman Abstract and Concrete Models for Secure Database Applications , 1991, DBSec.

[8]  Simon R. Wiseman The conflict between confidentiality and integrity , 1991, Proceedings Computer Security Foundations Workshop IV.

[9]  Teresa F. Lunt,et al.  Tuple-level vs Element-level Classification , 1993, Database Security.

[10]  G. W. Smith Identifying and representing the security semantics of an application , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[11]  Peter P. Chen The entity-relationship model: toward a unified view of data , 1975, VLDB '75.