Skip to main content

Sicherheit in Informationssystemen Gewährleistung und Begrenzung des Informationsflusses

  • Conference paper
VIS ’91 Verläßliche Informationssysteme

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 271))

  • 65 Accesses

Zusammenfassung

Ein Informationssystem soll große Mengen strukturierter Daten dauerhaft und verläßlich für viele und verschiedenartige Benutzer verfügbar halten, sowie Anfragen und Änderungen effizient bearbeiten. Innerhalb eines “Unternehmens„ wird ein Informationssystem typischerweise als technisches Hilfsmittel für die betriebliche Kommunikation verwendet. Das Informationssystem vermittelt dabei mit folgenden Besonderheiten die Mitteilungen der kommunikativ handelnden Personen:

  1. i)

    Es sind im allgemeinen schon eine große Anzahl von Mitteilungen eingegangen, und alle entsprechenden Daten stehen zur weiteren Vermittlung zur Verfügung.

  2. ii)

    Die Vermittlung erfolgt im allgemeinen zeitlich verzögert, indem das System im wesentlichen ein dreischrittiges Verfahren durchführt:

    • Annahme (oder Ablehnung) der Mitteilung gemäß den vereinbarten semantischen Bedingungen,

    • dauerhaftes Speichern der entsprechenden Daten gemäß der im Schema vereinbarten Formate,

    • Zusammenstellung oder Ableitung der durch eine Anfrage angeforderten Daten und ihre anschließende Duplizierung.

  3. iii)

    Die Qualität der Vermittlung wird verläßlich gesichert durch die Einhaltung semantischer Bedingungen und korrekte Ausführung von Transaktionen.

  4. iv)

    Die Vermittlung wird im allgemeinen vielen und verschiedenartigen Handelnden angeboten, die im allgemeinen aufgrund unterschiedlicher Verpflichtungen tätig sind.

  5. v)

    Die Vermittlung muß effizient erfolgen.

Dies ist eine gekürzte Fassung eines Beitrags für den Sammelband: G. Vossen, K.-U. Witt (Hrsg.), Entwicklungstendenzen bei Datenbank-Systemen, R. Oldenbourg Verlag, München, 1991. Autor und Herausgeber danken für die freundliche Genehmigung zum Abdruck in diesem Tagungsband.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literaturverzeichnis

  1. S.G., Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, Vol.1, No.3, 1983, pp. 239–248.

    Google Scholar 

  2. S.R. Ames, Security kernels: a solution or a problem?, Proc. IEEE Symp. on Security and Privacy, Oakland, 1981, pp. 141–150.

    Google Scholar 

  3. D.E. Bell, L.J. LaPadula, Secure Computer Systems, Mitre Corporation, Bedford, 1974.

    Google Scholar 

  4. J. Biskup, Privacy Respecting Permissions and Rights, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 173–185.

    Google Scholar 

  5. J. Biskup, H.H. Brüggemann, The personal model of data - towards a privacy-oriented information system, Computers & Security 7 (1988), pp. 575–597.

    Article  Google Scholar 

  6. J. Biskup, H.H. Brüggemann, Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick, 2. GI-Fachtagung Verläßliche Informationssysteme, Karlsruhe 1991, dieser Band.

    Google Scholar 

  7. J. Biskup, H.-W. Graf, Analysis of the privacy model for the information system DORIS, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp. 123–140.

    Google Scholar 

  8. D.A. Bonyun, The secure relational database management system kernel - three years after-, Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 34–37.

    Google Scholar 

  9. H.H. Brüggemann, Interaction of authorities and acquaintances in the DORIS privacy model of data, Proc. MFDBS 89, Lecture Notes in Computer Science 364, Springer, 1989, pp. 85–99.

    Google Scholar 

  10. Bundesverfassungsgericht, Urteil vom 15. Dezember 1983 zum Volkszählungsgesetz 1983, Bundesanzeiger 35, 241a (1983).

    Google Scholar 

  11. D.D. Clark, D.R. Wilson, A comparison of commercial and military computer security policies, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 184–194.

    Google Scholar 

  12. Congress, 93rd - 2nd Session, Privacy Act of 1974, Public Law 93–579.

    Google Scholar 

  13. G.I. Davida, R.A. DeMillo, RJ. Lipton, A system architecture to support a verifiably secure multilevel security system, Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 137–144.

    Google Scholar 

  14. G.I. Davida, D.L. Wells, J.B. Kam, A database encryption system with subkeys, ACM Transactions on Database Systems, Vol. 6, No. 2, 1981, pp. 312–328.

    Google Scholar 

  15. G.I. Davida, Y. Yeh, Cryptographic relational algebra, Proc. IEEE Symp. on Security and Privacy, Oakland, 1982, pp. 111–116.

    Google Scholar 

  16. D.E. Denning, Cryptographic checksums for multilevel database security, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 52–61.

    Google Scholar 

  17. D.E. Denning, Lessons learned from modeling a secure multilevel relational database system, Database Security : Status and Prospects (ed. C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 35–43.

    Google Scholar 

  18. D.E. Denning, T.F. Lunt, R.R. Schell, M. Heckman, W. Shockley, A multilevel relational data model, Proc. IEEE Symp. on Security and Privacy, Oakland, 1987, pp. 220–234.

    Google Scholar 

  19. K. Dittrich, M. Härtig, H. Pfefferle, Discretionary Access control in structurally object- oriented database systems, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp. 105–121.

    Google Scholar 

  20. J. Dobson, Security and Databases: A Personal View, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 11–21.

    Google Scholar 

  21. J. Dobson, Conversation structures as a means of specifying security policy, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 25–39.

    Google Scholar 

  22. Department of Defense Computer Security Center, Trusted Computer Systems Evaluation Criteria, CSC-STD-011–83, Fort Meode, 1983.

    Google Scholar 

  23. J.E. Dobson, J.A. McDermid, Security models and enterprise models, Database Security, II : Status and Prospects (ed. C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp. 1–39.

    Google Scholar 

  24. D. Downs, G. Popek, A kernel design for a secure data base managment system, Proc. 3rd Int. Conf. on Very Large Data Bases, 1977, pp. 507–514.

    Google Scholar 

  25. M. Fugini, Secure database development methodologies, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.

    Google Scholar 

  26. W. Gerhardt, Datensicherheit in Datenbanksystemen - Methoden und Trends, Rostocker Informatik-Berichte, Heft 10 (1990).

    Google Scholar 

  27. R. Graubart, The integrity-lock approach to secure database management, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 62–74.

    Google Scholar 

  28. R. Graubart, A comparison of three secure dbms architectures, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 167–190.

    Google Scholar 

  29. E. Gudes, The design of a cryptography based secure file system, Proc. IEEE Transactions on Software Engineering, Vol. SE-6, No.5, 1980, pp. 411–420.

    Google Scholar 

  30. J.T. Haigh, Modeling database security requirements, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.

    Google Scholar 

  31. T.F. Keefe, W.T. Tsai, Prototyping the SODA security model, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp.211–235.

    Google Scholar 

  32. C.E. Landwehr, editor, Database Security: Status and Prospects, North-Holland, Amsterdam etc., 1988.

    MATH  Google Scholar 

  33. C.E. Landwehr, editor, Database Security, II: Status and Prospects, North-Holland, Amsterdam etc., 1989.

    Google Scholar 

  34. M. Larrondo-Petrie, E. Gudes, H. Song, E.B. Fernandez, Security policies in object- oriented databases, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp.257–268.

    Google Scholar 

  35. C.E. Landwehr, C.L. Heitmeyer, J. McLean, A security model for military message systems, ACM Trans, on Computer Systems, Vol. 2, No. 3, 1984, pp. 198–222.

    Article  Google Scholar 

  36. C.P. Louwerse, J.M.L. Kouwenberg, Data protection aspects in an integrated hospital information system, Computers & Security, Vol. 3, 1984, pp. 286–294.

    Article  Google Scholar 

  37. F.H. Lochovsky, C.C. Woo, Role-based security in data base management systems, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 209–222.

    Google Scholar 

  38. T.F. Lunt, Multilevel security for object-oriented database systems, Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 199–209.

    Google Scholar 

  39. J.A. McDermid, E.S. Hocking, Security policies for integrated project support environments, Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 41–74.

    Google Scholar 

  40. C. Meadows, The integrity lock architecture and its application to message systems: reducing cover channels, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 212–218.

    Google Scholar 

  41. C. Meadows, Constructing container using a multilevel relational data model, Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 127–141.

    Google Scholar 

  42. C. Meadows, S. Jajodia, Integrity versus security in multi-level secure databases, Database Security : Status and Prospects (ed. C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 89–101.

    Google Scholar 

  43. Nationale IT-Sicherheitskriterien, Bundesanzeiger-Verlag, 1989.

    Google Scholar 

  44. K.A. Omar, D.L. Wells, Modified architecture for the sub-keys model, Proc. IEEE Symposium on Security and Privacy, 1983, Oakland, pp. 79–86.

    Google Scholar 

  45. F. Rabitti, D. Woelk, W. Kim, A model of authorization for object-oriented and semantic databases, Proc. Int. Conf. on Extending Database Technology, Venice, March 1988, Lecture Notes in Computer Science 303, Springer, 1988, pp. 231–250.

    Google Scholar 

  46. R.L. Rivest, L. Adleman, M.L. Dertouzos, On data banks and privacy homomorphisms, in: Foundation of Secure Computation (eds: DeMillo, Dobkin, Jones, Lipton), Academic Press, New York, 1978, pp. 169–177.

    Google Scholar 

  47. R., Sandhu, Mandatory controls for database integrity, Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 143–150.

    Google Scholar 

  48. R. Sawinski, P. Haas, Interaktive Definition und Pflege von datenschutzorientierten Benutzerschnittstellen, Proc. 31. Jahrestagung GMDS, 1986, Göttingen, Medizinische Informatik und Statistik 64, Springer, pp. 295–298.

    Google Scholar 

  49. D. Spooner, A.M. Keller, G. Wiederhold, J. Solasin, D. Heystek, Framework for the security component of an ADA DBMS, Proc. 12 th. Int. Conf. on Very Large Data Bases, Kyoto, 1986, pp. 347–354.

    Google Scholar 

  50. D.L. Spooner, C.E. Landwehr, editors, Database Security, III: Status and Prospects, North- Holland, Amsterdam etc., 1990.

    Google Scholar 

  51. T.C. Ting, A user-role based data security approach, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 187–208.

    Google Scholar 

  52. M.-T. Tinnefeid, H. Tubies, Datenschutzrecht, Oldenbourg, München-Wien, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1987 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Biskup, J. (1987). Sicherheit in Informationssystemen Gewährleistung und Begrenzung des Informationsflusses. In: Pfitzmann, A., Raubold, E. (eds) VIS ’91 Verläßliche Informationssysteme. Informatik-Fachberichte, vol 271. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-76562-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-76562-9_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-53911-7

  • Online ISBN: 978-3-642-76562-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics