Skip to main content

Classifying and Downgrading: Is a Human Needed in the Loop?

  • Chapter
Research Directions in Database Security
  • 48 Accesses

Abstract

This paper asserts that output products from a multilevel secure database environment should be classified at a level which accurately reflects, at the data semantics level, the contents of the product. The paper further asserts that for certain classes of data, “the system” can effectively determine the classification of the output product such that no human is required in the loop. For other classes of data, the paper asserts that we can not explicitly state the database security requirement; therefore, we cannot hope to implement a system that enforces those requirements and a human is required in the loop.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National Computer Security Center. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, December 1985.

    Google Scholar 

  2. B.B. Dillaway and J.T. Haigh. A practical design for a multilevel secure database management system. In Proceedings of the Second Aerospace Computer Security Conference, December 1986.

    Google Scholar 

  3. [DLS+87]_D.E. Denning, T.F. Lunt, R.R. Schell, M. Heckman, and W.R. Shockley. A multilevel relational data model. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.

    Google Scholar 

  4. D.E. Denning and M. Morgenstern. Military database technology study: AI techniques for security and reliability. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, 1986.

    Google Scholar 

  5. P. Dwyer, E. Onuegbe, and B.M. Thuraisingham. Design of a query processor for a multilevel secure relational database management system. Technical report, Honeywell Systems Research Center and Corporate Systems Development Division, 1988.

    Google Scholar 

  6. T. Kohonen. The “neural” phonetic typewriter. IEEE Computer, March 1988.

    Google Scholar 

  7. T.F. Lunt and T.A. Berson. An expert system to classify and sanitize text. In Proceedings of the Third Aerospace Computer Security Conference, December 1987.

    Google Scholar 

  8. J. McHugh. An EMACS-based downgrader for SAT. In Proceedings of the 8th National Computer Security Conference, October 1985.

    Google Scholar 

  9. P.A. Rougeau and E.D. Sturms. Sybase secure dataserver: A solution to the multilevel secure DBMS problem. In Proceedings of the 10th National Computer Security Conference, September 1987.

    Google Scholar 

  10. D.L. Waltz. Helping computers understand natural languages. IEEE Spectrum, November 1983.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

Smith, G.W. (1992). Classifying and Downgrading: Is a Human Needed in the Loop?. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-2870-7_11

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-97736-2

  • Online ISBN: 978-1-4612-2870-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics