Security constraint processing during multilevel secure database design

By means of simple examples, a design technique for multilevel secure databases is proposed. The design activity covers the conceptual modeling and design phase and consists of the development of secure data schemata and secure function schemata. Data schemata represent the semantics and secrecy properties of data while function schemata describe processes and activities within the system. As security constraints defined on data or functions may influence each other, it argued that the design of a secure system must be data- as well as function-driven. Although the example chosen is quite simple, it is possible to express and model complex security relevant data semantics.<<ETX>>

[1]  Teresa F. Lunt Aggregation and inference: facts and fallacies , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[2]  Gary W. Smith Modeling Security-Relevant Data Semantics , 1991, IEEE Trans. Software Eng..

[3]  Bhavani M. Thuraisingham,et al.  Security constraint processing during the update operation in a multilevel secure database management system , 1991, Proceedings Seventh Annual Computer Security Applications Conference.

[4]  Thomas H. Hinke,et al.  Inference aggregation detection in database management systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[5]  Edward Yourdon,et al.  Structured design : fundamentals of a discip!ine of computer proqram and system desiqn , 1979 .

[6]  Gary W. Smith,et al.  Multilevel secure database design: a practical application , 1989, [1989 Proceedings] Fifth Annual Computer Security Applications Conference.

[7]  Shamkant B. Navathe,et al.  Conceptual and Logical Design of Relational Databases , 1992, Adv. Comput..

[8]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[9]  David L. Tennenhouse,et al.  The Implementation of Secure Entity-Relationship Databases , 1985, 1985 IEEE Symposium on Security and Privacy.

[10]  Eduardo B. Fernández,et al.  Database security , 1990, SGMD.

[11]  Sushil Jajodia,et al.  Toward a multilevel secure relational data model , 1991, SIGMOD '91.

[12]  Sushil Jajodia,et al.  Database Security: Current Status and Key Issues , 1990, SIGMOD record.

[13]  K. F. Martin Condition monitoring of machine tool subsystems , 1992 .

[14]  G. Pernul,et al.  A multilevel secure relational data model based on views , 1991, Proceedings Seventh Annual Computer Security Applications Conference.

[15]  Matthew Morgenstern,et al.  Controlling logical inference in multilevel database systems , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[16]  G.W. Smith The semantic data model for security: representing the security semantics of an application , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.

[17]  Peter P. Chen The entity-relationship model: toward a unified view of data , 1975, VLDB '75.

[18]  Matthew Morgenstern,et al.  Security and inference in multilevel database and knowledge-base systems , 1987, SIGMOD '87.

[19]  Maria Grazia Fugini Secure Database Development Methodologies , 1987, DBSec.

[20]  Tom DeMarco,et al.  Structured Analysis and System Specification , 1978 .

[21]  G. E. Gajnak Some results from the entity/relationship multilevel secure DBMS project , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[22]  Shamkant B. Navathe,et al.  Conceptual Database Design: An Entity-Relationship Approach , 1991 .