ACM SIGMOD Anthology TODS dblp.uni-trier.de

MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management.

Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin: MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management. ACM Trans. Database Syst. 8(3): 382-409(1983)
@article{DBLP:journals/tods/TruebloodHM83,
  author    = {Robert P. Trueblood and
               H. Rex Hartson and
               Johannes J. Martin},
  title     = {MULTISAFE - A Modular Multiprocessing Approach to Secure Database
               Management},
  journal   = {ACM Trans. Database Syst.},
  volume    = {8},
  number    = {3},
  year      = {1983},
  pages     = {382-409},
  ee        = {http://doi.acm.org/10.1145/319989.319993, db/journals/tods/TruebloodHM83.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

This paper describes the configuration and intermodule communication of a MULTImodule system for supporting Secure Authorization with Full Enforcement (MULTISAFE) for database management. A modular architecture is described which provides secure, controlled access to shared data in a multiuser environment, with low performance penalties, even for complex protection policies. The primary mechanisms are structured and verifiable. The entire approach is immediately extendible to distributed protection of distributed data. The system includes a user and applications module (IJAM), a data storage and retrieval module (SRM), and a protection and security module (PSM). The control of intermodule communication is based on a data abstraction approach, initially described in terms of function invocations. An implementation within a formal message system is then described. The discussion of function invocations begins with the single terminal case and extends to the multiterminal case. Some physical implementation aspects are also discussed, and some examples of message sequences are given.

Copyright © 1983 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
Jayanta Banerjee, David K. Hsiao, Richard I. Baum: Concepts and Capabilities of a Database Computer. ACM Trans. Database Syst. 3(4): 347-384(1978) BibTeX
[2]
...
[3]
...
[4]
...
[5]
Per Brinch Hansen: Concurrent Programming Concepts. ACM Comput. Surv. 5(4): 223-245(1973) BibTeX
[6]
Per Brinch Hansen: The Programming Language Concurrent Pascal. IEEE Trans. Software Eng. 1(2): 199-207(1975) BibTeX
[7]
Per Brinch Hansen: Distributed Processes: A Concurrent Programming Concept. Commun. ACM 21(11): 934-941(1978) BibTeX
[8]
R. H. Canaday, R. D. Harrison, Evan L. Ivie, J. L. Ryder, L. A. Wehr: A Back-end Computer for Data Base Management. Commun. ACM 17(10): 575-582(1974) BibTeX
[9]
...
[10]
...
[11]
Thomas J. Cook: A Data Base Management System Design Philosophy. SIGMOD Conference 1975: 15-22 BibTeX
[12]
...
[13]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[14]
Dorothy E. Denning, Peter J. Denning, Mayer D. Schwartz: The Tracker: A Threat to Statistical Database Security. ACM Trans. Database Syst. 4(1): 76-96(1979) BibTeX
[15]
David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106(1979) BibTeX
[16]
Deborah Downs, Gerald J. Popek: A Kernel Design for a Secure Data Base Management System. VLDB 1977: 507-514 BibTeX
[17]
Philip H. Enslow Jr.: Multiprocessor Organization - A Survey. ACM Comput. Surv. 9(1): 103-129(1977) BibTeX
[18]
Arthur Evans Jr., William Kantrowitz, Edwin Weiss: A User Authentication Scheme Not Requiring Secrecy in the Computer. Commun. ACM 17(8): 437-442(1974) BibTeX
[19]
W. Morven Gentleman: Message Passing Between Sequential Processes: the Reply Primitive and the Administrator Concept. Softw., Pract. Exper. 11(5): 435-466(1981) BibTeX
[20]
...
[21]
...
[22]
...
[23]
David M. Harland: Concurrency in a Language Employing Messages. Inf. Process. Lett. 12(2): 59-62(1981) BibTeX
[24]
H. Rex Hartson, David K. Hsiao: A Semantic Model for Data Base Protection Languages. VLDB 1976: 27-42 BibTeX
[25]
...
[26]
...
[27]
C. A. R. Hoare: Monitors: An Operating System Structuring Concept. Commun. ACM 17(10): 549-557(1974) BibTeX
[28]
C. A. R. Hoare: Communicating Sequential Processes. Commun. ACM 21(8): 666-677(1978) BibTeX
[29]
...
[30]
...
[31]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) BibTeX
[32]
...
[33]
...
[34]
...
[35]
Hugh C. Lauer, Roger M. Needham: On the Duality of Operating System Structures. Operating Systems Review 13(2): 3-19(1979) BibTeX
[36]
...
[37]
K. Lunn, Keith H. Bennett: An Algorithm for Resource Location in a Loosely Linked Distributed Computer System. Operating Systems Review 15(2): 16-20(1981) BibTeX
[38]
...
[39]
Jonathan K. Millen: Security Kernel Validation in Practice. Commun. ACM 19(5): 243-250(1976) BibTeX
[40]
...
[41]
James L. Peterson: Notes on a Workshop on Distributed Computing, Held at the Harvard Faculty Club, Cambridge, MA, 12-13 October 1978. Operating Systems Review 13(3): 18-30(1979) BibTeX
[42]
Gerald J. Popek, David A. Farber: A Model for Verification of Data Security in Operating Systems. Commun. ACM 21(9): 737-749(1978) BibTeX
[43]
...
[44]
George B. Purdy: A High Security Log-in Procedure. Commun. ACM 17(8): 442-445(1974) BibTeX
[45]
...
[46]
...
[47]
Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning: Linear Queries in Statistical Databases. ACM Trans. Database Syst. 4(2): 156-167(1979) BibTeX
[48]
...
[49]
Bruce J. Walker, Richard A. Kemmerer, Gerald J. Popek: Specification and Verification of the UCLA Unix Security Kernel. Commun. ACM 23(2): 118-131(1980) BibTeX

Referenced by

  1. Elisa Bertino, Laura M. Haas: Views and Security in Distributed Database Management Systems. EDBT 1988: 155-169
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:52 2008