Skip to main content

Designing Secure Databases for OLS

  • Conference paper
Database and Expert Systems Applications (DEXA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2736))

Included in the following conference series:

Abstract

Some Database Management Systems (DBMS) allow to implement multilevel databases, but there are no methodologies for designing these databases. Security must be considered as a fundamental requirement in Information Systems (IS) development, and has to be taken into account at all stages of the development. We propose a methodology for designing secure databases, which allows to design and implement secure databases considering constraints regarding sensitive information from the requirements phase. The models and languages included in the methodology provide tools to specify constraints and to classify the information into different security levels and to specify which roles users need to play to access information. The methodology prescribes rules to specify the database and the security information with the Oracle9i Label Security (OLS) DBMS. It also has been applied in an actual case by the Data Processing Center of the Ciudad Real Provincial Government.

This research is part of the DOLMEN project (TIC2000-1673-C06-06) and RETISSI project (TIC2001-5023-E) supported by the Research Projects Subdirection of the Ministry of Science and Technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dhillon, G., Backhouse, J.: Information system security management in the new millennium. Communications of the ACM 43(7), 125–128 (2000)

    Article  Google Scholar 

  2. Brinkley, D., Schell, R.: What is there to worry about? An introduction to the computer security problem. In: Abrams, M., Jajodia, S. (eds.) Information security, an integrated collection of essays, California, ch. 1, IEEE Computer Society, Los Alamitos (1995)

    Google Scholar 

  3. Spanish Constitutional Law (15/1999). December 13th, on personal data protection. BOE no. 298, 14/12/1999 (in Spanish)

    Google Scholar 

  4. Directive (95/46/CE). Directive 95/46/CE of the European Parliament and Council, dated October 24th, about People protection regarding the personal data management and the free circulation of these data. DOCE no. L281, 23/11/1995, P.0031–0050

    Google Scholar 

  5. Devanbu, P., Stubblebine, S.: Software engineering for security: a roadmap. The future of software engineering. In: Finkelstein, A. (ed.) Proceedings of the 22nd International Conference on Software Engineering, pp. 227–239 (2000)

    Google Scholar 

  6. Ferrari, E., Thuraisingham, B.: Secure Database Systems. In: Piattini, M., Díaz, O. (eds.) Advanced Databases: Technology Design. Artech House, London (2000)

    Google Scholar 

  7. Hall, A., Chapman, R.: Correctness by construction developing a commercial secure system. IEEE Software 19(1), 18–25 (2002)

    Article  Google Scholar 

  8. Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-functional requirements in software engineering. Kluwer Academic Publishers, Boston (2000)

    MATH  Google Scholar 

  9. Smith, G.W.: Modeling security-relevant data semantics. Proceedings of the IEEE Trans. On Software Engineering 17(11), 1195–1203 (1991)

    Article  Google Scholar 

  10. Marks, D., Sell, P., Thuraisingham, B.: MOMT: A multilevel object modeling technique for designing secure database applications. Journal of Object-Oriented Programming 9(4), 22–29 (1996)

    Google Scholar 

  11. Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J., Hussmann, H., Cook, S. (eds.) UML 2002 – The Unified Modeling Language, Model engineering, concepts and tools, pp. 412–425. Springer, Germany (2002)

    Google Scholar 

  12. Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison-Wesley, Reading (1994)

    Google Scholar 

  13. Batini, C., Ceri, S., Navathe, S.: Conceptual database design. In: An entity relationship approach. Addison-Wesley, New York (1991)

    Google Scholar 

  14. Connolly, T., Begg, C.: Database systems. In: A practical approach to design, implementation and management. Addison Wesley, Reading (2002)

    Google Scholar 

  15. Levinger, J. Oracle label security. Administrator’s guide. Release 2 (9.2). Retrieved July 1 (2002), from http://www.csis.gvsu.edu/GeneralInfo/Oracle/network.920/a96578.pdf

  16. Avison, D., Lau, F., Myers, M., Nielsen, A.: Action research. Communications of the ACM 42(1), 94–97 (1999)

    Article  Google Scholar 

  17. Fernández-Medina, E., Martínez, A., Medina, C., Piattini, M.: Integrating Multilevel Security in the Database Design Process. In: Proceedings of the 6th International Conference on Integrated Design and Process Technology (IDPT 2002), Pasadena, California (June 2002)

    Google Scholar 

  18. Piattini, M., Fernández-Medina, E.: Specification of security constraints in UML. In: Proceedings of the 35th Annual 2001 IEEE International Carnahan Conference on Security Technology (ICCST 2001), London (UK), pp. 163–171 (October 2001)

    Google Scholar 

  19. Leavitt, N.: Whatever happened to Object-Oriented Databases? In: Industry Trends. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  20. Conrad, C., Turowski, K.: Temporal OCL: Meeting specification demands for business components. In: Siau, K., Halpin, T. (eds.) Unified modeling language: Systems analysis, design and development issues, ch.10. Idea Group Publishing, Hersey (2001)

    Google Scholar 

  21. Toval, A., Olmos, A., Piattini, M.: Legal Requirements Reuse: A Critical Success Factor for Requirements Quality and Personal Data Protection. In: IEEE Joint International Requirements Engineering Conference (RE 2002), pp. 95–103. IEEE Computer Society, Los Alamitos (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fernández-Medina, E., Piattini, M. (2003). Designing Secure Databases for OLS. In: Mařík, V., Retschitzegger, W., Štěpánková, O. (eds) Database and Expert Systems Applications. DEXA 2003. Lecture Notes in Computer Science, vol 2736. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45227-0_86

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45227-0_86

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40806-2

  • Online ISBN: 978-3-540-45227-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics