Skip to main content

SEER: Security enhanced entity-relationship model for secure relational databases

  • Non-Traditional Modeling Approaches
  • Conference paper
  • First Online:
OOER '95: Object-Oriented and Entity-Relationship Modeling (ER 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1021))

Included in the following conference series:

Abstract

In this paper we propose extensions of the ER modeling concepts to address the conceptual modeling of security features and authorization histories in a database. It is designed to serve as the global conceptual model in a federated database environment. In such databases, data belonging to a variety of users under different constraints and security policies is subject to sharing. For the purposes of this paper, we assume that the local databases are relational. We propose a two-layered representation of data, one of which is the traditional ER model, whereas the other layer deals with the history of authorizations. We propose a methodology for dealing with relational databases by first analyzing the local database schemas and then mapping the security constraints appropriately while transforming/integrating each local data model into the global data model. We believe that the proposed conceptual model provides a useful common framework for dealing with the modeling and enforcement of security schemes in federated database environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. Batini, S. Ceri, and S. Navathe. Conceptual Database Design: Entity-Relationship Approach. Benjamin Cumings, 1991.

    Google Scholar 

  2. P Chen. The entity-relationship model: Toward a unified view of data. ACM Transactions on Database Systems, 1(1), 1976.

    Google Scholar 

  3. E. Codd. A relational model of data for large shared data bank. Communications of ACM, 13(6), 1970.

    Google Scholar 

  4. E. Codd. Extending the database relational model to capture more meaning. ACM Transactions on Database Systems, 4(4), 1979.

    Google Scholar 

  5. S. Dumpala and S. Arora. Schema translation using the entity-relationship approach. Entity-Relationship Approach to Information Modeling and Analysis, 1983.

    Google Scholar 

  6. G. Gajnak. Some results from the entity-relationship multilevel secure dbms project. In the 4th Aerospace Computer Security Application Conference, 1988.

    Google Scholar 

  7. R. Hull and R. King. Semantic database modeling: Survey, applications, and research issues. Computing Surveys, 19(3), 1987.

    Google Scholar 

  8. S. Jajodia and R. Sandhu. Database security: current status and key issues. SIGMOD Record, 19(4):123–126, 1990.

    Google Scholar 

  9. P. Johannesson and K. Kaiman. A method for translating relational schemas into conceptual schema. In C. Batini, editor, the 7th International Conference on Entity-Relationship Approach, pages 279–294. North-Holland, 1988.

    Google Scholar 

  10. B. Lampson. Protection. In the 5th Princeton Symposium on Information Science, 1971.

    Google Scholar 

  11. T. Lunt and Fernandez E. Database security. SIGMOD Record, 19(4):90–97, 1990.

    Google Scholar 

  12. S. Navathe and A. Awong. Abstracting relational and hierarchical data with a semantic data model. In the 6th International Conference on Entity-Relationship Approach. North-Holland, 1987.

    Google Scholar 

  13. Department of Defense. Trusted computer system evaluation criteria, 1985.

    Google Scholar 

  14. Y. Oh and S. Navathe. Seer: Security enhanced entity-relationship model for modeling and integrating secure database environments. Technical Report GIT-TR-95-29, Georgia Institute of Tecnology, 1995.

    Google Scholar 

  15. Y. Oh, S. Navathe, and G. Pernul. Entity-relationship modeling of global security in a federated database environment. Technical Report GIT-TR-91-57, Georgia Institute of Tecnology, 1991.

    Google Scholar 

  16. B. Patkau and D. Tennenhouse. The implementation of secure entity-relationship databases. In IEEE Sympo. on Security and Privacy, 1985.

    Google Scholar 

  17. J. Peckham and F. Maryanski. Semantic data models. ACM Computing Surveys, 20(3), 1988.

    Google Scholar 

  18. G. Pernul and A. Tjoa. A view integration approach for the design of mis databases. In 10th Int'l. Conf. on the Entity-Relationship Approach, 1991.

    Google Scholar 

  19. A. Sheth and J. Larson. Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Computing Surveys, 22(3), 1990.

    Google Scholar 

  20. G. Smith. Multilevel secure database design: a practical application. In 5th annual Computer security applications conference, 1990.

    Google Scholar 

  21. Trusted Database Management System. Interpretation of the trusted computer system evaluation criteria, 1990.

    Google Scholar 

  22. M. Templeton, E. Lund, and P. Ward. Pragmatics of access control in mermaid. In special issue on Federated Database Systems, Quarterly Bulletin of the IEEE-CS TC on Data Engineering, 10(3), 1987.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Michael P. Papazoglou

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oh, YC., Navathe, S.B. (1995). SEER: Security enhanced entity-relationship model for secure relational databases. In: Papazoglou, M.P. (eds) OOER '95: Object-Oriented and Entity-Relationship Modeling. ER 1995. Lecture Notes in Computer Science, vol 1021. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0020530

Download citation

  • DOI: https://doi.org/10.1007/BFb0020530

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60672-7

  • Online ISBN: 978-3-540-48527-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics