Update semantics for multilevel relations

A formal operational semantics is given for update operations on multilevel relations, i.e., relations in which individual data elements are classified at different levels. For this purpose, the familiar INSERT, UPDATE and DELETE operations of SQL are suitably generalized to cope with polyinstantiation. The authors conjecture that these operations are consistent (or sound) in that all relations which can be constructed will satisfy the basic integrity properties required of multilevel relations. They also conjecture that the operations are complete in that every multilevel relation can be constructed by some sequence of these operations.<<ETX>>

[1]  Sushil Jajodia,et al.  Polyinstantiation integrity in multilevel relations , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Sushil Jajodia,et al.  Polyinstantiation Integrity in Multilevel Relations Revisited , 1990, DBSec.

[3]  Dorothy E. Denning,et al.  A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.

[4]  Dorothy E. Denning,et al.  Lessons Learned from Modeling a Secure Multilevel Relational Database System , 1988, DBSec.

[5]  G. E. Gajnak Some results from the entity/relationship multilevel secure DBMS project , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[6]  Dorothy E. Denning,et al.  The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[7]  Donovan Hsieh,et al.  Update Semantics for a Multilevel Relational Database System , 1990, Database Security.

[8]  Sushil Jajodia,et al.  A new polyinstantiation integrity constraint for multilevel relations , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.

[9]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .

[10]  Sushil Jajodia,et al.  A formal framework for single level decomposition of multilevel relations , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.