Advertisement

Integrity Constraints in Federated Databases

  • Martin S. Olivier
Chapter
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT)

Abstract

This paper considers integrity issues that arise because of the relative autonomous nature of sites in a federated database. Such autonomy requires guarantees from the provider of a service and enforcement of such guarantees. Guarantees are expressed as integrity constraints.

Federated databases can form the basis of many forms of automated interorganisational processes. Successful automation of such processes depends on conformance to expectations of all organisations involved. Although mechanisms (such as contract law) exist to ensure compliance, the existing mechanisms are too complex to automate and also too lengthy for many time-critical processes or transactions.

The paper describes an approach where a service provider provides a guarantee, an analysis site simplifies the checking of such constraints and a certification site certifies that guarantees will be enforced.

Keywords

Distributed Systems Heterogeneous Databases Security and Protection 

Keyword codes

C.2.4 H.2.5 K.6.5 

References

  1. Abrams, M.D., Amoroso, E.G., LaPadula, L.J., Lunt, T.F. and Williams, J.G. (1993) Report of an Integrity Research Study Group. Computers 6 Security, 12, 679–89.CrossRefGoogle Scholar
  2. Bertino, E., Bettini, C., Ferrari, E. and Samarati, P. (1996) A Decentralized Temporal Authorization Model, in Information Systems Security—Facing the Information Society of the 21st Century (eds. S.K. Katsikas and D Gritzalis) Chapman & Hall, London, 271–80.Google Scholar
  3. Ceri, S. and Widom, J. (1993) Managing Semantic Heterogeneity with Production Rules and Persistent Queues. Proceedings of the 19th VLDB Conference, Dublin, Ireland, 108–19.Google Scholar
  4. Chawathe, S.S., Garcia-Molina, H. and Widom, J. (1993) Constraint Management in Loosely Coupled Distributed Databases. Technical report, Computer Science Department, Stanford University.Google Scholar
  5. Chawathe, S.S., Garcia-Molina, H. and Widom, J. (1996) A Toolkit for Constraint Management in Heterogeneous Information Systems, in Proceedings of the Twelfth International Conference on Data Engineering (ed. S.Y.W. Su) IEEE Computer Society, Los Alamitos, CA, 56–65.CrossRefGoogle Scholar
  6. Date, C.J. (1983) An Introduction to Database Systems, Volume II. Addison-Wesley, Reading, Massachusetts.Google Scholar
  7. Dayal, U., Hanson, E. and Widom, J. (1995) Active Database Systems, in Modern Database Systems: The Object Model, Interoperability and Beyond (ed. W. Kim) ACM Press, New York, New York, 434–56.Google Scholar
  8. Eswaran, K.P., Gray, J.N., Lorie, R.A. and Traiger, I.L. (1976) The Notions of Consistency and Predicate Locks in a Database System. Communications of the ACM, 19, 11, 624–33.zbMATHCrossRefMathSciNetGoogle Scholar
  9. Fernandez, E.B., Summers, R.C. and Wood, C. (1981) Database Security and Integrity. Addison-Wesley, Reading, Massachusetts.Google Scholar
  10. Grefen, P. and Widom, J. (1996) Integrity Constraint Checking for Federated Databases. Proceedings of the First IFCIS International Conference on Cooperative Information Systems, Brussels, Belgium, 38–47.CrossRefGoogle Scholar
  11. Hailpern, B. and Ossher, H. (1990) Extending Objects to Support Multiple Interfaces and Access Control. IEEE transactions on Software Engineering, 16, 11, 1247–57.CrossRefGoogle Scholar
  12. Kappe, F. and Maurer, H. (1994) From Hypertext to Active Communication/Information Systems. Journal of Microcomputer Applications, 17, 333–44.CrossRefGoogle Scholar
  13. Kim, W., ed. (1995) Modern Database Systems: The Object Model, Interoperability and Beyond. ACM Press, New York, New York.zbMATHGoogle Scholar
  14. Lunt, T.F. (1995) Authorization in Object-Oriented Databases, in Modern Database Systems: The Object Model, Interoperability and Beyond (ed. W. Kim) ACM Press, New York, New York, 130–45.Google Scholar
  15. Olivier, M.S. and Von Solms, S.H. (1994) A Taxonomy for Secure Object-oriented Databases. ACM Transactions on Database Systems, 19, 1, 3–46.CrossRefGoogle Scholar
  16. Olivier, M.S. (1995) Self-protecting Objects in a Secure Federated Database. Ninth IFIP WG 11. 3 Conference on Database Security, Rensselaerville, New York.Google Scholar
  17. Olivier, M.S. (1996) Self-protecting Objects in Multipolicy Federated Databases: A Prototype. In preparation.Google Scholar
  18. Özsu, M.T. and Valduriez, P. (1991) Principles of Distributed Database Systems. Prentice-Hall, Englewood Cliffs, New Jersey.Google Scholar
  19. Rabitti, F., Bertino, E., Kim, W. and Woelk, D. (1991) A Model of Authorization for Next-Generation Database Systems. ACM Transactions on Database Systems, 16, 1, 88–131.CrossRefGoogle Scholar
  20. Rusinkiewicz, M., Sheth, A. and Karabatis, G. (1991) Specifying Interdatabase Dependencies in a Multidatabase Environment. IEEE Computer, 24, 12, 46–53.CrossRefGoogle Scholar
  21. Sandhu, R. and Jajodia, S. (1991) Integrity Principles and Mechanisms in Database Management Systems. Computers éa Security, 10, 413–27.CrossRefGoogle Scholar
  22. Sandhu, R. and Jajodia, S. (1995) Integrity Mechanisms is Database Management Systems, in Information Security: An Integrated Collection of Essays, (eds. M.D. Abrams, S. Jajodia and H.J. Podell ). IEEE Computer Society, Washington, DC.Google Scholar
  23. Sheth, A.P. and Larson, J.A. (1990) Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases. ACM Computing Surveys, 22, 3, 183–236.CrossRefGoogle Scholar
  24. Shilling, J.J. and Sweeney, P.F. (1989) Three Steps to Views: Extending the Object-Oriented Paradigm. Proceedings of the Conference on Object-Oriented Programming Systems, Languages and Applications, ACM, 353–61.Google Scholar
  25. Thuraisingham, B. (1994) Security issues for federated database systems. Computers &Security, 13, 509–25.CrossRefGoogle Scholar
  26. Woelk, D., Bohrer, B., Jacobs, N., Ong, K., Tomlinson, C. and Unnikrishnan, C. (1995) Carnot and InfoSleuth: Database Technology and the World Wide Web. Sigmod Record, 24, 2, 443–44.CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 1997

Authors and Affiliations

  • Martin S. Olivier
    • 1
  1. 1.Department of Computer ScienceRand Afrikaans UniversityJohannesburgSouth Africa

Personalised recommendations