Advertisement

Self-protecting Objects in a Secure Federated Database

  • Martin S Olivier
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)

Abstract

This paper presents an implementation strategy for a secure federated database. A federated database is a distributed database with a relatively high degree of site autonomy. The proposed implementation strategy assumes that a federal security policy specifies the security aspects that apply to all sites of the federation. Each site is then able to extend the security policy that applies to data owned by it with its own site security policy. The site security policies are guaranteed to be enforced even if an object of one site is relocated to another site.

Keywords

Distributed Systems Heterogeneous Databases Security and Protection 

Keywords Codes

C.2.4 H.2.5 K.6.5 

References

  1. Bull, JA, Gong, L and Sollins, KR (1992) Towards Security in an Open Systems Foundation, 3–20 in Computer Security—ESORICS 92. Second European Symposium on Research in Computer Security, (eds Y Deswarte, G Eizenberg and J-J Quisquater) Springer-Verlag, Amsterdam.Google Scholar
  2. Castano, S, Fugini, MG, Martella, G and Samarati, P (1995) Database Security, Addison-Wesley, Wokingham, England.zbMATHGoogle Scholar
  3. Ceri, S and Pelagatti, G (1985) Distributed Databases, McGraw-Hill, NewYork.Google Scholar
  4. Coulouris, G, Dollimore, J and Kindberg, T (1994) Distributed Systems: Concepts and Design, Second edition, Addison-Wesley, Wokingham, England.Google Scholar
  5. Date, CJ (1985) An Introduction to Database Systems Volume 2, Addison-Wesley, Reading, Massachsetts.Google Scholar
  6. Denning, DE (1988) Database Security, 1–22 in Annual Review of Computer Science Volume S (eds JF Traub et al), Annual Reviews Inc, Palo Alto, California.Google Scholar
  7. Gong, L and Qian, X (1994) The complexity and Composability of Secure Interoperation, Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, 190–200, Oakland, California.CrossRefGoogle Scholar
  8. Idris, NB, Gray, WA and Qutaishat, MA (1994) Integration of Secrecy Features in a Fed-erated Database Environment, 89–108 in Database Security VII: Status and Prospects, (eds TF Keefe and CE Landwehr) North-Holland, Amsterdam.Google Scholar
  9. Jajodia, S, McCollum, CD and Blaustein, BT (1994) Integrating Concurrency Control and Commit Algorithms in Distributed Secure Databases, 109–21 in Database Security VII: Status and Prospects, (eds TF Keefe and CE Landwehr) North-Holland, Amsterdam.Google Scholar
  10. Jonscher, D and Dittrich, KR (1994) An Approach For Building Secure Database Federations, 20th VLDB Conference, Santiago, Chile.Google Scholar
  11. Kim, W (1991) Object-oriented database systems: strengths and weaknesses, Journal of Object-oriented Programming, 4, 4, 21–9.Google Scholar
  12. Lee, YS, Wang, FJ and Chang, CH (1994) Object Movement in Distributed Object-oriented Systems, Information Sciences, 78, 19–47.MathSciNetCrossRefGoogle Scholar
  13. Olivier, MS and Von Solms, SH (1992) Building a Secure Database Using Self-protecting Objects, Computers & Security, 11, 3, 1992, 259–71.CrossRefGoogle Scholar
  14. Olivier, MS and Von Solms, SH (1994) A Taxonomy for Secure Object-oriented Databases, ACM Transactions on Database Systems, 19, 1, 3–46.CrossRefGoogle Scholar
  15. Olivier, MS (1995) A Multilevel Secure Federated Database, Database Security VIII (A60), 183–98 (eds J Biskup, M Morgenstern and CE Landwehr), North-Holland, Amsterdam.Google Scholar
  16. Olivier, MS (1995) Self-Protecting Objects: A Prototype, Submitted.Google Scholar
  17. Ozsu, MT and Valduriez, P (1991) Principles of Distributed Database Systems, Prentice-Hall, London.Google Scholar
  18. Pernul, G (1993) Canonical Security Modelling for Federated Databases, 207–22, in Interoperable Database Systems (eds DK Hsiao, EJ Neuhold and R Sacks-Davis ), Elsevier, Amsterdam.Google Scholar
  19. Rabitti, F, Bertino, E, Kim, W and Woelk, D (1991) A Model of Authorization for Next-Generation Database Systems, ACM Transactions on Database Systems, 16, 1, 88–131.CrossRefGoogle Scholar
  20. Sheth, AP and Larson, JA (1990) Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases, ACM Computing Surveys, 22, 3, 183–236.CrossRefGoogle Scholar
  21. Thuraisingham, B (1994) Security issues for federated database systems, Computers &Security, 13, 509–25.CrossRefGoogle Scholar
  22. Wegner, P (1990) Concepts and Paradigms of Object-Oriented Programming, OOPS Messenger, 1, 1, 7–87.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 1996

Authors and Affiliations

  • Martin S Olivier
    • 1
  1. 1.Department of Computer ScienceRand Afrikaans UniversityJohannesburgSouth Africa

Personalised recommendations