Abstract
Multilevel secure (MLS) database models provide a data protection mechanism different from traditional data access control. The MLS database has been used in various application domains including government, hospital, military, etc. The MLS database model protects data by grouping them into different classification and creates different views to the users of different clearance levels. Previous models have focused on data level classification like tuples and elements. In this study, we introduce a schema level classification mechanism, i.e. attribute and relation classification. We first define the basic model, and then give definitions of integration properties and operations of database. The schema classification scheme will reduce semantics inferences and thus prevent users from compromising the database.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. E. Bell, and L. J. LaPadula, “Secure Computer Systems: Mathematical Foundations,” 01 Nov 1973, 1973.
D. Bell, and L. La Padula, “Secure Computer System: Unified Exposition and Multics Interpretation, MTR-2997,” MITRE Corp., Bedford, MA, 1976.
K. Biba, “Integrity considerations for secure computer systems,” Storming Media, 1977.
X. Qian, and T. Lunt, “Tuple-level vs. element-level classification,” in Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects, Simon Fraser Univ., Vancouver, British Columbia, Canada, 1993.
T. Hinke, and M. Schaefer, Secure Data Management System: Defense Technical Information Center, 1975.
C. C. C. OTTAWA, and M. Grohn, “A Model of a Protected Data Management System,” 1976.
T. Hinke, C. Garvey, N. Jensenet al., “Al secure DBMS design.”
D. E. Denning, T. F. Lunt, R. R. Schellet al., “The SeaView security model.” pp. 218-233.
T. F. Lunt, D. E. Denning, R. R. Schellet al., “The SeaView Security Model,” IEEE Trans. Softw. Eng., vol. 16, no. 6, pp. 593-607, 1990.
D. Tcsec,Trusted computer system evaluation criteria, Technical Report 5200.28-STD, US Department of Defense, 1985.
S. Jajodia, and R. Sandhu, “Toward a multilevel secure relational data model,” SIGMOD Rec., vol. 20, no. 2, pp. 50-59, 1991.
T. F. Lunt, “Polyinstantiation: an inevitable part of a multilevel world.” pp. 236-238.
A. Galinovic, and V. Antoncic, “Polyinstantiation in Relational Databases with Multilevel Security.” pp. 127-132.
P. Dwyer, E. Onuegbe, P. Stachouret al., “Query processing in LDV: a secure database system.” pp. 118-124.
D. O’Brien, “The LDV approach to polyinstantiation.” pp. 239-240.
P. D. Stachour, and B. Thuraisingham, “Design of LDV: a multilevel secure relational database management system,” Knowledge and Data Engineering, IEEE Transactions on, vol. 2, no. 2, pp. 190-209, 1990.
N. Jukic, S. V. Vrbsky, A. Parrishet al., “A belief-consistent multilevel secure relational data model,” Information Systems, vol. 24, no. 5, pp. 377-400, 1999.
M. Pranjic, K. Fertalj, and N. Jukic, “Importance of semantics in MLS database models.” pp. 51-56 vol.1.
R. Sandhu, and F. Chen, “The multilevel relational (MLR) data model,” ACM Trans. Inf. Syst. Secur., vol. 1, no. 1, pp. 93-132, 1998.
H. Garcia-Molina, J. D. Ullman, and J. Widom, Database Systems: The Complete Book: Prentice Hall Press, 2008.
J. Goguen, and J. Meseguer, “Security policies and security models,” Proceedings of the 1982 Symposium on Security and Privacy, pp. 11-20, 1982.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this paper
Cite this paper
Su, TA., Lu, HJ. (2010). A Schema Classification Scheme for Multilevel Databases. In: Sobh, T., Elleithy, K. (eds) Innovations in Computing Sciences and Software Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-9112-3_72
Download citation
DOI: https://doi.org/10.1007/978-90-481-9112-3_72
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-9111-6
Online ISBN: 978-90-481-9112-3
eBook Packages: Computer ScienceComputer Science (R0)