ACM SIGMOD Anthology VLDB dblp.uni-trier.de

A Kernel Design for a Secure Data Base Management System.

Deborah Downs, Gerald J. Popek: A Kernel Design for a Secure Data Base Management System. VLDB 1977: 507-514
@inproceedings{DBLP:conf/vldb/DownsP77,
  author    = {Deborah Downs and
               Gerald J. Popek},
  title     = {A Kernel Design for a Secure Data Base Management System},
  booktitle = {Proceedings of the Third International Conference on Very Large
               Data Bases, October 6-8, 1977, Tokyo, Japan},
  publisher = {IEEE Computer Society},
  year      = {1977},
  pages     = {507-514},
  ee        = {db/conf/vldb/DownsP77.html},
  crossref  = {DBLP:conf/vldb/77},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

The need for reliable protection facilities, which allow controlled sharing of data in multi-user data base management systems, is steadily growing. This paper first discusses concepts relevant to such protection facilities, including data security, object grenularity, data incependence, and software certification. Those system characteristics required for reliable security and suitable functiorality are listec. The facilities which an operating system must provide in support of a such date base management system also are outlined. A kernel based data base management system architecture is then presented which supports value independent security and allows various grains of protection down to the size of comains in relations. It is shown that the proposed structure can substantially improve the reliability of protection in data bases.

Copyright © 1977 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Proceedings of the Third International Conference on Very Large Data Bases, October 6-8, 1977, Tokyo, Japan. IEEE Computer Society 1977
Contents BibTeX

References

[1]
Morton M. Astrahan, Mike W. Blasgen, Donald D. Chamberlin, Kapali P. Eswaran, Jim Gray, Patricia P. Griffiths, W. Frank King III, Raymond A. Lorie, Paul R. McJones, James W. Mehl, Gianfranco R. Putzolu, Irving L. Traiger, Bradford W. Wade, Vera Watson: System R: Relational Approach to Database Management. ACM Trans. Database Syst. 1(2): 97-137(1976) BibTeX
[2]
Peter S. Browne, Dennis D. Steinauer: A Model for Access Control. SIGFIDET Workshop 1971: 241-262 BibTeX
[3]
Donald D. Chamberlin, Raymond F. Boyce, Irving L. Traiger: A Deadlock-Free Scheme for Resource Locking in a Data-Base Environment. IFIP Congress 1974: 340-343 BibTeX
[4]
...
[5]
Richard W. Conway, William L. Maxwell, Howard L. Morgan: On the Implementation of Security Measures in Information Systems. Commun. ACM 15(4): 211-220(1972) BibTeX
[6]
E. F. Codd: A Relational Model of Data for Large Shared Data Banks. Commun. ACM 13(6): 377-387(1970) BibTeX
[7]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[8]
C. J. Date, P. Hopewell: File Definition and Logical Data Independence. SIGFIDET Workshop 1971: 117-138 BibTeX
[9]
...
[10]
Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman: An Authorization Model for a Shared Data Base. SIGMOD Conference 1975: 23-31 BibTeX
[11]
...
[12]
...
[13]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[14]
H. Rex Hartson, David K. Hsiao: A Semantic Model for Data Base Protection Languages. VLDB 1976: 27-42 BibTeX
[15]
Gerald Held, Michael Stonebraker: Storage Structures and Access Methods in the Relational Data Base Management System INGRES. ACM Pacific 1975: 26-33 BibTeX
[16]
...
[17]
...
[18]
...
[19]
Butler W. Lampson: A Note on the Confinement Problem. Commun. ACM 16(10): 613-615(1973) BibTeX
[20]
Jack Minker: Performing Inferences over Relation Data Bases. SIGMOD Conference 1975: 79-91 BibTeX
[21]
Richard C. Owens Jr.: Evaluation of Access Authorization Characteristics of Derived Data Sets. SIGFIDET Workshop 1971: 263-278 BibTeX
[22]
...
[23]
...
[24]
...
[25]
...
[26]
...
[27]
...

Referenced by

  1. Joachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989: 348-355
  2. Elisa Bertino, Laura M. Haas: Views and Security in Distributed Database Management Systems. EDBT 1988: 155-169
  3. Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin: MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management. ACM Trans. Database Syst. 8(3): 382-409(1983)
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
VLDB Proceedings (1977-1981): Copyright © by IEEE,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:44:59 2009