An information theoretic analysis of architectures for multilevel secure databases

被引:0
|
作者
Aisbett, JE [1 ]
机构
[1] UNIV TASMANIA,DEPT APPL COMP & MATH,LAUNCESTON,TAS 7250,AUSTRALIA
来源
DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS | 1997年
关键词
multilevel secure database; distributed databases; information security; information measure;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper develops a framework for assessing the security cost of implementations of a class of distributed database architectures, a framework which has previously been lacking in the literature. The value of information in a relational database is first introduced, i.e. a value is ascribed to the thing the security is to protect. In identifying sources of security costs, both the hiding of information from authorised users and the disclosure of information to unauthorised users are considered. Parameters which describe the effects of implementation and system usage on the security of the architecture are then determined. Finally, guidelines for estimating the information values and the implementation parameters required in calculating the security cost model are provided. For simplicity only two security classes are considered, although the method would extend to any access control policies based on hierarchical classes. The cost model assumes nothing about the assurance of the implementation of the access control policy, and so applies equally to privacy considerations in the design of health care database systems or to national security considerations in military databases.
引用
收藏
页码:212 / 225
页数:14
相关论文
共 50 条
  • [1] INFERENCE SECURE MULTILEVEL DATABASES
    LIN, TY
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 21 : 317 - 332
  • [2] On logical foundations of multilevel secure databases
    Jamil, HM
    Dobbie, G
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2004, 23 (03) : 271 - 294
  • [3] On Logical Foundations of Multilevel Secure Databases
    Hasan M. Jamil
    Gillian Dobbie
    Journal of Intelligent Information Systems, 2004, 23 : 271 - 294
  • [4] A fair locking protocol for multilevel secure databases
    Jajodia, S
    Mancini, L
    Setia, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 168 - 178
  • [5] Event detection in multilevel secure active databases
    Ray, I
    Huang, W
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 177 - 190
  • [6] ON TRANSACTION PROCESSING FOR MULTILEVEL SECURE REPLICATED DATABASES
    KANG, IE
    KEEFE, TF
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 329 - 347
  • [7] Query Processing in Multilevel Secure Distributed Databases
    Sapra, Pooja
    Kumar, Suresh
    Rathy, R. K.
    SOUVENIR OF THE 2014 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2014, : 490 - 494
  • [8] Information theoretic metrics for software architectures
    Shereshevsky, M
    Ammari, H
    Gradetsky, N
    Mili, A
    Ammar, HH
    25TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 2001, : 151 - 157
  • [9] Information-theoretic secure identification
    Desmedt, Y
    1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 296 - 296
  • [10] Development of a Concurrency Control Technique for Multilevel Secure Databases
    Sapra, Pooja
    Kumar, Suresh
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 111 - 115