Integrity Constraints in Federated Databases
This paper considers integrity issues that arise because of the relative autonomous nature of sites in a federated database. Such autonomy requires guarantees from the provider of a service and enforcement of such guarantees. Guarantees are expressed as integrity constraints.
Federated databases can form the basis of many forms of automated interorganisational processes. Successful automation of such processes depends on conformance to expectations of all organisations involved. Although mechanisms (such as contract law) exist to ensure compliance, the existing mechanisms are too complex to automate and also too lengthy for many time-critical processes or transactions.
The paper describes an approach where a service provider provides a guarantee, an analysis site simplifies the checking of such constraints and a certification site certifies that guarantees will be enforced.
KeywordsDistributed Systems Heterogeneous Databases Security and Protection
Keyword codesC.2.4 H.2.5 K.6.5
- Bertino, E., Bettini, C., Ferrari, E. and Samarati, P. (1996) A Decentralized Temporal Authorization Model, in Information Systems Security—Facing the Information Society of the 21st Century (eds. S.K. Katsikas and D Gritzalis) Chapman & Hall, London, 271–80.Google Scholar
- Ceri, S. and Widom, J. (1993) Managing Semantic Heterogeneity with Production Rules and Persistent Queues. Proceedings of the 19th VLDB Conference, Dublin, Ireland, 108–19.Google Scholar
- Chawathe, S.S., Garcia-Molina, H. and Widom, J. (1993) Constraint Management in Loosely Coupled Distributed Databases. Technical report, Computer Science Department, Stanford University.Google Scholar
- Date, C.J. (1983) An Introduction to Database Systems, Volume II. Addison-Wesley, Reading, Massachusetts.Google Scholar
- Dayal, U., Hanson, E. and Widom, J. (1995) Active Database Systems, in Modern Database Systems: The Object Model, Interoperability and Beyond (ed. W. Kim) ACM Press, New York, New York, 434–56.Google Scholar
- Fernandez, E.B., Summers, R.C. and Wood, C. (1981) Database Security and Integrity. Addison-Wesley, Reading, Massachusetts.Google Scholar
- Lunt, T.F. (1995) Authorization in Object-Oriented Databases, in Modern Database Systems: The Object Model, Interoperability and Beyond (ed. W. Kim) ACM Press, New York, New York, 130–45.Google Scholar
- Olivier, M.S. (1995) Self-protecting Objects in a Secure Federated Database. Ninth IFIP WG 11. 3 Conference on Database Security, Rensselaerville, New York.Google Scholar
- Olivier, M.S. (1996) Self-protecting Objects in Multipolicy Federated Databases: A Prototype. In preparation.Google Scholar
- Özsu, M.T. and Valduriez, P. (1991) Principles of Distributed Database Systems. Prentice-Hall, Englewood Cliffs, New Jersey.Google Scholar
- Sandhu, R. and Jajodia, S. (1995) Integrity Mechanisms is Database Management Systems, in Information Security: An Integrated Collection of Essays, (eds. M.D. Abrams, S. Jajodia and H.J. Podell ). IEEE Computer Society, Washington, DC.Google Scholar
- Shilling, J.J. and Sweeney, P.F. (1989) Three Steps to Views: Extending the Object-Oriented Paradigm. Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, ACM, 353–61.Google Scholar