Techniques
Treating data privacy in distributed systems

https://doi.org/10.1016/0378-7206(81)90049-5Get rights and content

Abstract

This papers describes and is primarily concerned with the security data definition and management in a distributed data base of aggregated type, although the approach described may be applied to any distributed system architecture. A multi-level logical security architecture is presented reflecting the logical architecture of the distributed system. In particular, three security logical schemata are proposed: the network security schema, the external security schemata, and the intermediate security schemata. For each schema data models are introduced, allowing the definition and the management of security information. Mapping rules between the logical levels are discussed. Finally security mechanisms are analyzed.

References (23)

  • H.R. Hartson

    Data Base Security-System Architectures

    Information Systems

    (1981)
  • C. Wood et al.

    Database Security: Requirements, Policies, and Models,

    IBM Systems Journal

    (1980)
  • (1979)
  • S. Spaccapietra

    Heterogeneous Data Base Distribution

  • M. Adiba

    Un modéle rélationnel et une architecture pour les systemes de base de données réparties

  • A. Klug et al.

    Multiple view support within the ANSI/SPARC Framework

    Proc. 3rd VLDB Conf.

    (Oct. 1977)
  • C.J. Date

    An architecture for high-level language database extensions

    Proc. ACM SIGMOD Conf.

    (June 1976)
  • J.R. Abrial
  • G. Bracchi et al.

    Binary logical associations in data modelling

  • M.E. Senko

    DIAM as a detailed example of the ANSI/SPARC architecture

  • P. Hall et al.

    Relations and entitics

  • Cited by (4)

    • Information security management: A state of the art

      2012, 17th Symposium of the Association Information and Management 2012, AIM 2012
    • Current state of information security research in IS

      2009, Communications of the Association for Information Systems

    Umberto Bussolati received the degree in Electronics Engineering from the Politecnico of Milan in 1979. Since then, he has contributed to researches developed in the Computer Science Laboratory at the Electrotechnics and Electronics Institut in Politecnico of Milan, where now he is a Researcher in Computer Science. He is a specialist in privacy and security management in information systems and has developed several works in this area which he has submitted to and presented in many international congresses and scientific reviews. He gives lessons and courses on this topic and has published the first Italian book on computer security. His researches also include database and office information systems management and design, with various published contributions. He participates to the National Researches Council's project on authomatized methodologies for database design.

    ∗∗

    Giancarlo Martella received the Dr. Ing. degree in Electronics Engineering from the Politecnico of Milan in 1968. Since then, he has been with the Computer Science, Laboratory at the Istituto di Elettrotecnica ed Elettronica of the Politecnico di Milano, where he is currently an Associate Professor of Computer Science. His main research interests are in the field of information systems analysis and design, data base management, distributed informatics. His current researches include data base security and privacy control. He authored more than thirty papers on these topics and has been invited to many workshops and conferences. In the 1981 he has received the Huspi international award for a research on automated data bases in clinical applications, and the Cilea-Univac award for a research on data security in information systems. He has consulted for several companies and governments on advanced EDP system design, and has organized post-doctoral courses for technical and management personnel. He is the Chairman of the working group on Information Systems of the Italian Association for Automatic Computing (AICA).

    View full text