Research directions in database security
Many commercial and defense applications require a database system that protects data of different sensitivities while still allowing users of different clearances to access the system. This book is a collection of papers covering aspects of the emerging security technology for multilevel database systems. It contains reports on such landmark systems as SeaView, LDV, ASD, Secure Sybase, the UNISYS secure distributed system, and the secure entity-relationship system GTERM. Much of the research is concerned with the relational model, although security for the entity-relationship and object-oriented models of data are also discussed. Because the field is so new, it has been extremely difficult to learn about the research going on in this area, until now. This book will be invaluable to researchers and system designers in database systems and computer security. It will also be of interest to data users and custodians who are concerned with the security of their information. This book can also be used as a text for an advanced topics course on computer security in a computer science curriculum.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Al Secure DBMS Architecture
An Investigation of Secure Distributed DBMS
19 other sections not shown
Other editions - View all
access class access view aggregation application approach architecture attribute base relations classification constraints Computer Security consistency course covert channels Data Manager data model database management system database security defined delete discretionary access controls discussed dominates downgrade employee enforcement entity environment example files foreign key GTERM high back-end IEEE Symposium inference problem integrity constraints interface labels logical mandatory access control mandatory security metadata MSQL multilevel data multilevel database systems multilevel relational multilevel secure National Computer Security object object-oriented operating system pipeline polyinstantiation primary key query referential integrity relational database relational model relationship replicated result retrieval schema SD-DBMS SeaView secure database system Secure DBMS Secure SQL Server Security and Privacy security level security requirements security semantics sensitive Shockley single-level SMMS specific SRI International Symposium on Security T.F. Lunt Technical Report TOP SECRET tuple types U.S.S. Enterprise unclassified untrusted update user's view definition workshop