Integrity Mechanisms in Database Management Systems

So the first order of business is to define integrity. Our approach to this question is pragmatic and utilitarian. The objective is to settle on a definition within which we can achieve practically useful results, rather than search for some absolute and airtight formulation. We define integrity1as being concerned with the improper modification of information (much as confidentiality is concerned with improper disclosure). We understand modification to include insertion of new information and deletion of existing information, as well as changes to existing information.

[1]  C. J. Date An Introduction to Database Systems, Volume I, 5th Edition , 1986 .

[2]  R. Sandhu Transformation of access rights , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[3]  Eduardo B. Fernandez,et al.  Database Security and Integrity , 1981 .

[4]  共立出版株式会社 コンピュータ・サイエンス : ACM computing surveys , 1978 .

[5]  Stuart W. Katzke,et al.  Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS) , 1989 .

[6]  Sushil Jajodia,et al.  Audit Trail Organization in Relational Databases , 1989, DBSec.

[7]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[8]  Joseph H. Wimbrow A Large Scale Interactive Administrative System , 1971, IBM Syst. J..

[9]  Lawrence Snyder,et al.  Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.

[10]  David D. Clark,et al.  A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.

[11]  Jim Gray,et al.  Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.

[12]  Ravi S. Sandhu,et al.  The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.

[13]  Theodore A. Linden Operating System Structures to Support Security and Reliable Software , 1976, CSUR.

[14]  Ravi Sandhu,et al.  Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[15]  F. Poole,et al.  Distributed data bases , 1980 .

[16]  Jim Gray,et al.  Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.

[17]  Morris Sloman,et al.  The source of authority for commercial access control , 1988, Computer.