Integrity principles and mechanisms in database management systems

Our objective in this paper is to answer the following question: what mechanisms are required in a general-purpose multiuser database management system (DBMS) to facilitate the integrity objectives of information systems? In a nutshell our conclusion is that realistic mechanisms do exist. Although existing commercial products fall far short of providing the requisite mechanisms, they can be easily extended to incorporate these mechanisms. Our principal contribution is to identify these mechanisms and to point out where gaps still remain. We have also bridged the terminology and concepts of database and security specialists in a coherent manner. In the more detailed considerations the focus of this paper is on relational DBMSs.

[1]  Amihai Motro,et al.  Integrity = validity + completeness , 1989, TODS.

[2]  Ravi S. Sandhu,et al.  The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.

[3]  Peter J. Denning,et al.  Data Security , 1979, CSUR.

[4]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[5]  Stuart W. Katzke,et al.  Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS) , 1989 .

[6]  Joseph H. Wimbrow A Large Scale Interactive Administrative System , 1971, IBM Syst. J..

[7]  F. Poole,et al.  Distributed data bases , 1980 .

[8]  Morris Sloman,et al.  The source of authority for commercial access control , 1988, Computer.

[9]  R. Sandhu Transformation of access rights , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[10]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[11]  Ravi Sandhu,et al.  Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[12]  Jim Gray,et al.  Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.

[13]  Jim Gray,et al.  Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.

[14]  Theodore A. Linden Operating System Structures to Support Security and Reliable Software , 1976, CSUR.

[15]  Sushil Jajodia,et al.  Audit Trail Organization in Relational Databases , 1989, DBSec.

[16]  Ravi S. Sandhu Mandatory Controls for Database Integrity , 1989, DBSec.

[17]  E. F. Codd,et al.  Extending the database relational model to capture more meaning , 1979, ACM Trans. Database Syst..

[18]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[19]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[20]  共立出版株式会社 コンピュータ・サイエンス : ACM computing surveys , 1978 .