Abstract
In this paper, formal logic is used as a basis for establishing concepts in multilevel databases. Issues covered include: model and proof theoretic approaches to formalizing multilevel database concepts, environments associated with security levels, the inference problem, handling negative information and the inclusion of formal semantics of time. Finally, issues related to the theory of multilevel relational databases, consistency and completeness of security constraints and assigning security levels to data are also briefly addressed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S.G. Akl and D.E. Denning. Checking classification constraints for consistency and completeness. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
C. Beeri. On the membership problem for functional and multilevel dependencies in relational databases. A CM Transactions on Database Systems, 5(3), 1980.
T.A. Berson and T.F. Lunt. Multilevel security for knowledgebased systems. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
F. Bry and R. Monthes. Checking consistency of database constraints: A logical approach. In Proceedings of the VLDB Conference, 1986.
[CCF+87]_P. Chisholm, G. Chen, D. Ferbrache, P. Thanisch, and J. Williams. Coping with indefinite and negative data in deductive databases, a survey. Data and Knowledge Engineering Journal, 2(4), 1987.
U. Chakravarthy, J. Grant, and J. Minker. Foundations of semantic query optimization. In Foundations of Deductive Databases and Logic Programming. Morgan Kaufmann, 1988.
K. Clark. Negation as failure. In Logic and Databases. Plenum Press, 1978.
K. Clark. Predicate logic as a computational formalism. Research Report 79/55, Department of Computing, Imperial College, London, 1979.
E.F. Codd. A relational model for large shared data banks. Communications of the ACM, 13(6), June 1970.
J. Clifford and D. Warren. Formal semantics for time in databases. ACM Transactions on Database Systems, 8(2), 1983.
[DAH+87a]_D.E. Denning, S.G. Akl, M. Heckman, T.F. Lunt, M. Morgenstern, P.G. Neumann, and R.R. Schell. Views for multilevel database security. IEEE Transactions on Software Engineering, 13(2), February 1987.
[DAH+87b]_D.E. Denning, S.G. Akl, M. Heckman, M. Morgenstern, P.G. Neumann, and R.R. Schell. Views for multilevel database security. In Proceedings of the 1986 IEEE Symposium on Security and Privacy, April 1987.
H. Decker. Integrity enforcement on deductive databases. In Proceedings of the Expert Database Systems Conference, South Carolina, 1986.
P.A. Dwyer, G.D. Jelatis, and B.M. Thuraisingham. Multilevel security in database management systems. Computers and Security, 6(3), June 1987.
[DLS+87]_D.E. Denning, T.F. Lunt, R.R. Schell, M. Heckman, and W.R. Shockley. A multilevel relational data model. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
P. Dwyer, E. Onuegbe, P. Stachour, and B. Thuraisingham. Query processing in LDV — a secure database management system. In Proceedings of the Fourth Aerospace Computer Security Conference, December 1988.
R. Frost. Introduction to Knowledge-Based Systems. Collins, 1986.
H. Gallaire and J. Minker. Logic and Databases. Plenum Press, 1978.
J. Grant and J. Minker. Answering queries in indefinite database and the null value problem. Advanced Computer Research, 3, 1986.
T.H. Hinke. Inference aggregation detection in database management systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
T.F. Keefe, M.B. Thuraisingham, and W.T. Tsai. Secure query processing strategies. IEEE Computer, 23(3), March 1989.
T.F. Keefe, W.T. Tsai, and M.B. Thuraisingham. SODA: A secure object-oriented database system. Computers and Security, forthcoming.
J. Lloyd. Foundations of Logic Programming. Springer-Verlag, 1984.
J. Lloyd and R. Toper. Making prolog more expressive. Logic Programming Journal, 1(3), 1984.
T.F. Lunt and B.M. Thuraisingham. Security for large AI systems. In Proceedings of the AAAI-88 Workshop on Databases in Large AI Systems, August 1988.
D. Maier. Theory of Relational Databases. Computer Science Press, 1983.
J. Minker. On indefinite databases and closed-world assumption. In Proceedings of the Sixth Conference on Automated Deduction. Springer-Verlag, Lecture Notes in Computer Science, 1982.
J. Minker. Foundations of Deductive Databases and Logic Programming. Morgan Kaufmann, 1988.
R. Montague. The proper treatment of quantification in ordinary English. In Approaches to Natural Languages. Dordrecht, Germany, 1973.
M. Morgenstern. Security and inference in multilevel database and knowledge-base systems. In Proceedings of the ACM International Conference on Management of Data (SIGMOD-87), May 1987.
J. Nicolas. Logic for improved integrity checking in relational databases. Acta Informatica, 18(3), 1982.
J. Nicolas and K. Yazdania. Integrity checking in deductive databases. In Logic and Databases. Plenum Press, 1978.
E. Onuegbe. Polyinstantiation, functional dependencies and multivalued dependencies. Technical report, Honeywell Internal Report, 1987.
R. Reiter. On closed-world databases. In Logic and Databases. Plenum Press, 1978.
F. Sadri and R. Kowalski. Theorem-proving approach to database integrity. In Foundations of Deductive Databases and Logic Programming. Morgan Kaufmann, 1988.
T. Su and G. Ozsoyoglu. Data dependencies and inference control in multilevel relational database systems. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
P. Stachour and M.B. Thuraisingham. Design of LDV: A multilevel secure relational database management system. IEEE Transactions on Knowledge and Data Engineering, forthcoming.
A. Tarski. A lattice theoretical fixpoint theorem and its application. Pacific Journal of Math, 5(3), 1955.
M.B. Thuraisingham. Toward the design of a secure database/knowledge base management system, forthcoming.
M.B. Thuraisingham. Security checking in relational database management systems augmented with inference engines. Computers and Security, 6(6), 1987.
M.B. Thuraisingham. An algorithm for assigning security levels to data. Technical report, Honeywell Technical Note, October 1988.
M.B. Thuraisingham. Security in object-oriented database management systems. Journal of Object-Oriented Programming, forthcoming.
M.B. Thuraisingham, W.T. Tsai, and T. Keefe. Secure query processing using AI techniques. In Hawaii International Conference on Systems Sciences, January 1988.
J.D. Ullman. Principles of Database and Knowledge-Base Systems, Volume 1. Computer Science Press, Rockville, Maryland, 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
Thuraisingham, B. (1992). Foundations of Multilevel Databases. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_18
Download citation
DOI: https://doi.org/10.1007/978-1-4612-2870-7_18
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97736-2
Online ISBN: 978-1-4612-2870-7
eBook Packages: Springer Book Archive