Skip to main content

Develop Secure Database System with Security Extended ER Model

  • Conference paper
Book cover Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3683))

  • 1280 Accesses

Abstract

Database system security is desired for acutely today. But it is difficult and expensive to develop secure database system because the developers usually find it difficult to design a consistent and complete database structure. To solve the problem we focus on the research results on both DB design model and the security mechanisms. The secure database system development will be simplified greatly by combining database design methodology and information security technique. So we made the effort to combine the security control mechanisms (e.g. MAC) and database develop model-Entity Relation (ER) model to construct a Security Extended ER (SEER) model. The security of the database system developed with SEER model is analyzed at the last part in the paper. The research and applying of SEER model puts forward a new ideal about secure database system development.

The paper is supported by 973 project of China (Grant No. TG1999035801)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Department of Defense: Trusted Computer System Evaluation Criteria, DoD 5200.28-STD (December 1985)

    Google Scholar 

  2. NCSC: The Trusted Database Management System Interpretation of Trusted Computer System Evaluation Criteria, NCSC-TG-21 (April 1991)

    Google Scholar 

  3. Chen, P.P.: The Entity-Relationship Model: Towards & Unified View of Data. ACM Transaction on Database Systems 1(1), 9–36 (1976)

    Article  Google Scholar 

  4. Lunt, T.F., Denning, D.E., Schell, R.R., Heckman, M., Shockley, W.R.: The SeaView security model. IEEE Transactions on Software Engineering 16(6), 593–607 (1990)

    Article  Google Scholar 

  5. Wood, A.W., Lewis, S.R., Wiseman, S.R.: The SWORD Multilevel Secure DBMS, DRA Report No. 92005 (1992)

    Google Scholar 

  6. Lewis, S., Wiseman, S.: Database design and MLS DBMSs: an unhappy alliance? In: Proceedings Computer Security Applications Conference, 1993, Ninth Annual, December 6-10, pp. 232–243 (1993)

    Google Scholar 

  7. Bell, D.E., La Padula, L.J.: Secure Computer Systems: A Refinement of the Mathematical Fundations [J], ESD-TR-73-278, vol. III, AD 780 528, Electronic Systems Division, Air Force System Command, Hanscom AFB, Bedford, Massachusetts (November 1974)

    Google Scholar 

  8. The PostgreSQL Global Development Group, PostgreSQL 7.3.2 Developer.s Guide [S/OL], http://www.postgresql.org/docs/pdf/7.3/developer-7.3.2-A4.pdf_2004/4-25

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, X., Han, Z., Liu, J., Shen, Cx. (2005). Develop Secure Database System with Security Extended ER Model. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_141

Download citation

  • DOI: https://doi.org/10.1007/11553939_141

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics