Merging heterogeneous security orderings

  • P. A. Bonatti
  • M. L. Sapino
  • V. S. Subrahmanian
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1146)


The problem of integrating multiple heterogeneous legacy databases is an important problem. Many papers [7, 9, 3] to date on this topic have assumed that all the databases comprising a mediated/federated system share the same security ordering. This assumption is often not true as the databases may have been developed independently by different agencies at different points in time. In this paper, we present techniques by which we may merge multiple security orderings into a single unified ordering that preserves the security relationships between orderings. We present a logic programming based approach, as well as a graph theoretical approach to this problem.


Theoretical Foundations of Security Heterogeneous Mediated/Federated Systems 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Y. Arens, C.Y. Chee, C.N. Hsu and C. Knoblock. Retrieving and Integrating Data from Multiple Information Sources, Intl. J. of Intelligent Cooperative Info. Systems, 2, 2, pp. 127–158, 1994.Google Scholar
  2. 2.
    G. Birkhoff. Lattice Theory, American Math. Society, Providence, 1967.Google Scholar
  3. 3.
    K.S. Candan, S. Jajodia and V.S. Subrahmanian. Secure Mediated Databases, to appear in:Proc. 1996 IEEE Conf. on Data Engineering.Google Scholar
  4. 4.
    S. Chawathe, H. Garcia-Molina, J. Hammer, K. Ireland, Y. Papakonstantinou, J. Ullman and J. Widom. (1994) The TSIMMIS Project: Integration of Heterogeneous Information Sources, Proc. IPSJ Conf., Tokyo, Japan, Oct. 1994.Google Scholar
  5. 5.
    W.F. Dowling, J.H. Gallier. Linear-time algorithms for testing satisfiability of propositional Horn formulae. Journal of Logic Programming, 3:267–284, (1984).Google Scholar
  6. 6.
    L. Gong and X. Qian. (1996) Computational Issues in Secure Interoperation, IEEE Trans. on Software Engineering, 22, 1, pp. 43–52.Google Scholar
  7. 7.
    N. B. Idris, W. A. Gray and R. F. Churchhouse, Providing Dynamic Security Control in a Federated Database, Proc. 1994 Intl. Conf. on Very Large Databases, pp. 13–23.Google Scholar
  8. 8.
    V.E. Jones and M. Winslett. (1993) Secure Database Interoperation via Role Translation, in “Security for Object Oriented Systems (eds. B. Thuraisingham, R. Sandhu amd T.C. Ting), Springer Verlag.Google Scholar
  9. 9.
    D. Jonscher and K. R. Diittrich, An approach for building secure database federations, Proc. 20th VLDB Conf., 1994.Google Scholar
  10. 10.
    Laks V.S. Lakshmanan, F. Sadri and I.N. Subramanian, On the logical foundations of schema integration and evolution in Heterogeneous Database Systems, Proc. DOOD-93, Phoenix, Arizona, 1993.Google Scholar
  11. 11.
    J.W. Lloyd. (1987) Foundations of Logic Programming, Springer.Google Scholar
  12. 12.
    V.S. Subrahmanian, et al. (1995) HERMES: A Heterogeneous Reasoning and Mediator System, submitted for publication.Google Scholar
  13. 13.
    R. Tarjan. Depth-first search and linear graph algorithms. SIAM J. of Computing, 1(2):146–160 (1972)Google Scholar
  14. 14.
    G. Wiederhold, Mediators in the Architecture of Future Information Systems, IEEE Computer, pp. 38–49, March 1992.Google Scholar
  15. 15.
    G. Wiederhold, Intelligent Integration of Information, Proceedings of the ACM Conference on Management of Data, pp. 434–437, 1993.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • P. A. Bonatti
    • 1
  • M. L. Sapino
    • 1
  • V. S. Subrahmanian
    • 2
  1. 1.Università di TorinoItaly
  2. 2.University of MarylandUSA

Personalised recommendations