ACM SIGMOD Anthology VLDB dblp.uni-trier.de

Framework for the Security Component of an Ada DBMS.

David L. Spooner, Arthur M. Keller, Gio Wiederhold, John Salasin, Deborah Heystek: Framework for the Security Component of an Ada DBMS. VLDB 1986: 347-354
@inproceedings{DBLP:conf/vldb/SpoonerKWSH86,
  author    = {David L. Spooner and
               Arthur M. Keller and
               Gio Wiederhold and
               John Salasin and
               Deborah Heystek},
  editor    = {Wesley W. Chu and
               Georges Gardarin and
               Setsuo Ohsuga and
               Yahiko Kambayashi},
  title     = {Framework for the Security Component of an Ada DBMS},
  booktitle = {VLDB'86 Twelfth International Conference on Very Large Data Bases,
               August 25-28, 1986, Kyoto, Japan, Proceedings},
  publisher = {Morgan Kaufmann},
  year      = {1986},
  isbn      = {0-934613-18-4},
  pages     = {347-354},
  ee        = {db/conf/vldb/SpoonerKWSH86.html},
  crossref  = {DBLP:conf/vldb/86},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

This paper discusses a framework for the design of a security component for a secure Ada database management system (DBMS). It is part of a development effort to produce prototype technologies for the World Wide Military Command and Control System (WWMCCS) Information System (WIS). In this paper we present a series of criteria for evaluating database security approaches. We develop the high-level framework for the security component of a DBMS and illustrate how it can support several alternative security models, which we compare using these criteria. The security enforced by the DBMS relies an appropriate security mechanisms enforced by the operating systems for operating system objects, such as files, used by the DBMS. We also present the security barrier or filter as an alternative or adjunct to the notion of a trusted computer base.

Copyright © 1986 by the VLDB Endowment. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the VLDB copyright notice and the title of the publication and its date appear, and notice is given that copying is by the permission of the Very Large Data Base Endowment. To copy otherwise, or to republish, requires a fee and/or special permission from the Endowment.


Online Paper

ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Wesley W. Chu, Georges Gardarin, Setsuo Ohsuga, Yahiko Kambayashi (Eds.): VLDB'86 Twelfth International Conference on Very Large Data Bases, August 25-28, 1986, Kyoto, Japan, Proceedings. Morgan Kaufmann 1986, ISBN 0-934613-18-4
Contents BibTeX

References

[Ber85]
...
[Che85]
...
[Dat83]
...
[Day78]
...
[Den82]
Dorothy E. Denning: Cryptography and Data Security. Addison-Wesley 1982
BibTeX
[DOD83]
...
[Fri86]
Fred J. Friedman, Arthur M. Keller, John Salasin, Gio Wiederhold, Murray R. Berkowitz, David L. Spooner: Reference Model for Ada Interfaces to Database Management Systems. ICDE 1986: 492-506 BibTeX
[Fri86a]
Fred J. Friedman, Bill R. Brykczynski: ADA/SQL: A Standard, Portable ADA-DBMS Interface. ICDE 1986: 515-522 BibTeX
[Gra72]
...
[Gri76]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[Har76]
...
[Kel85]
...
[Kel85a]
...
[Kel85b]
...
[Rot80]
James B. Rothnie Jr., Philip A. Bernstein, Stephen Fox, Nathan Goodman, Michael Hammer, Terry A. Landers, Christopher L. Reeve, David W. Shipman, Eugene Wong: Introduction to a System for Distributed Databases (SDD-1). ACM Trans. Database Syst. 5(1): 1-17(1980) BibTeX
[Spo84]
David L. Spooner, Ehud Gudes: A Unifying Approach to the Design of a Secure Database Operating System. IEEE Trans. Software Eng. 10(3): 310-319(1984) BibTeX
[Sto75]
...
[Wie86]
...
[WIS84]
...

Referenced by

  1. Joachim Biskup, Hans Hermann Brüggemann: The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract). ICDE 1989: 348-355
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
VLDB Proceedings: Copyright © by VLDB Endowment,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:45:31 2009