Design and implementation of a query processor for a trusted distributed data base management system

Distributed systems are vital for the efficient processing required in military and commercial applications. For many of these applications, it is especially important that the distributed data base management systems (DDBMS) operate in a secure manner. For example, the DDBMS should allow users, who are cleared at different security levels access to the data base at different levels of data sensitivity without compromising security. A DDBMS with multilevel user/datahandling capability is called a trusted distributed data base management system (TDDBMS). This article focuses on query processing in a TDDBMS. It describes the security issues, algorithms for query processing, and design and implementation of a query processor prototype for a TDDBMS.

[1]  Marvin Schaefer,et al.  Secure Data Management System. , 1975 .

[2]  Bhavani M. Thuraisingham Multilevel security issues in distributed database management systems II , 1991, Comput. Secur..

[3]  Bhavani M. Thuraisingham,et al.  Security checking in relational database management systems augmented with inference engines , 1987, Comput. Secur..

[4]  Bhavani M. Thuraisingham,et al.  Design of LDV: a multilevel secure relational database management system , 1990 .

[5]  Bhavani M. Thuraisingham,et al.  Multilevel security issues in distributed database management systems , 1988, Comput. Secur..

[6]  Morrie Gasser,et al.  Building a Secure Computer System , 1988 .

[7]  Richard D. Graubart,et al.  The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.

[8]  Clement T. Yu,et al.  On the design of a query processing strategy in a distributed database environment , 1983, SIGMOD '83.

[9]  Bhavani M. Thuraisingham,et al.  Secure query processing in distributed database management systems-design and performance studies , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.

[10]  Stefano Ceri,et al.  Distributed Databases: Principles and Systems , 1984 .

[11]  Stephen T. Walker Network Security Overview , 1985, 1985 IEEE Symposium on Security and Privacy.

[12]  Eugene Wong,et al.  Query processing in sdd-i: a system for distributed databases , 1979 .

[13]  Dorothy E. Denning,et al.  A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.