Skip to main content

Foundations of Multilevel Databases

  • Chapter
Research Directions in Database Security

Abstract

In this paper, formal logic is used as a basis for establishing concepts in multilevel databases. Issues covered include: model and proof theoretic approaches to formalizing multilevel database concepts, environments associated with security levels, the inference problem, handling negative information and the inclusion of formal semantics of time. Finally, issues related to the theory of multilevel relational databases, consistency and completeness of security constraints and assigning security levels to data are also briefly addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S.G. Akl and D.E. Denning. Checking classification constraints for consistency and completeness. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.

    Google Scholar 

  2. C. Beeri. On the membership problem for functional and multilevel dependencies in relational databases. A CM Transactions on Database Systems, 5(3), 1980.

    Google Scholar 

  3. T.A. Berson and T.F. Lunt. Multilevel security for knowledgebased systems. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.

    Google Scholar 

  4. F. Bry and R. Monthes. Checking consistency of database constraints: A logical approach. In Proceedings of the VLDB Conference, 1986.

    Google Scholar 

  5. [CCF+87]_P. Chisholm, G. Chen, D. Ferbrache, P. Thanisch, and J. Williams. Coping with indefinite and negative data in deductive databases, a survey. Data and Knowledge Engineering Journal, 2(4), 1987.

    Google Scholar 

  6. U. Chakravarthy, J. Grant, and J. Minker. Foundations of semantic query optimization. In Foundations of Deductive Databases and Logic Programming. Morgan Kaufmann, 1988.

    Google Scholar 

  7. K. Clark. Negation as failure. In Logic and Databases. Plenum Press, 1978.

    Google Scholar 

  8. K. Clark. Predicate logic as a computational formalism. Research Report 79/55, Department of Computing, Imperial College, London, 1979.

    Google Scholar 

  9. E.F. Codd. A relational model for large shared data banks. Communications of the ACM, 13(6), June 1970.

    Google Scholar 

  10. J. Clifford and D. Warren. Formal semantics for time in databases. ACM Transactions on Database Systems, 8(2), 1983.

    Google Scholar 

  11. [DAH+87a]_D.E. Denning, S.G. Akl, M. Heckman, T.F. Lunt, M. Morgenstern, P.G. Neumann, and R.R. Schell. Views for multilevel database security. IEEE Transactions on Software Engineering, 13(2), February 1987.

    Google Scholar 

  12. [DAH+87b]_D.E. Denning, S.G. Akl, M. Heckman, M. Morgenstern, P.G. Neumann, and R.R. Schell. Views for multilevel database security. In Proceedings of the 1986 IEEE Symposium on Security and Privacy, April 1987.

    Google Scholar 

  13. H. Decker. Integrity enforcement on deductive databases. In Proceedings of the Expert Database Systems Conference, South Carolina, 1986.

    Google Scholar 

  14. P.A. Dwyer, G.D. Jelatis, and B.M. Thuraisingham. Multilevel security in database management systems. Computers and Security, 6(3), June 1987.

    Google Scholar 

  15. [DLS+87]_D.E. Denning, T.F. Lunt, R.R. Schell, M. Heckman, and W.R. Shockley. A multilevel relational data model. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.

    Google Scholar 

  16. P. Dwyer, E. Onuegbe, P. Stachour, and B. Thuraisingham. Query processing in LDV — a secure database management system. In Proceedings of the Fourth Aerospace Computer Security Conference, December 1988.

    Google Scholar 

  17. R. Frost. Introduction to Knowledge-Based Systems. Collins, 1986.

    Google Scholar 

  18. H. Gallaire and J. Minker. Logic and Databases. Plenum Press, 1978.

    Google Scholar 

  19. J. Grant and J. Minker. Answering queries in indefinite database and the null value problem. Advanced Computer Research, 3, 1986.

    Google Scholar 

  20. T.H. Hinke. Inference aggregation detection in database management systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  21. T.F. Keefe, M.B. Thuraisingham, and W.T. Tsai. Secure query processing strategies. IEEE Computer, 23(3), March 1989.

    Google Scholar 

  22. T.F. Keefe, W.T. Tsai, and M.B. Thuraisingham. SODA: A secure object-oriented database system. Computers and Security, forthcoming.

    Google Scholar 

  23. J. Lloyd. Foundations of Logic Programming. Springer-Verlag, 1984.

    Google Scholar 

  24. J. Lloyd and R. Toper. Making prolog more expressive. Logic Programming Journal, 1(3), 1984.

    Google Scholar 

  25. T.F. Lunt and B.M. Thuraisingham. Security for large AI systems. In Proceedings of the AAAI-88 Workshop on Databases in Large AI Systems, August 1988.

    Google Scholar 

  26. D. Maier. Theory of Relational Databases. Computer Science Press, 1983.

    Google Scholar 

  27. J. Minker. On indefinite databases and closed-world assumption. In Proceedings of the Sixth Conference on Automated Deduction. Springer-Verlag, Lecture Notes in Computer Science, 1982.

    Google Scholar 

  28. J. Minker. Foundations of Deductive Databases and Logic Programming. Morgan Kaufmann, 1988.

    Google Scholar 

  29. R. Montague. The proper treatment of quantification in ordinary English. In Approaches to Natural Languages. Dordrecht, Germany, 1973.

    Google Scholar 

  30. M. Morgenstern. Security and inference in multilevel database and knowledge-base systems. In Proceedings of the ACM International Conference on Management of Data (SIGMOD-87), May 1987.

    Google Scholar 

  31. J. Nicolas. Logic for improved integrity checking in relational databases. Acta Informatica, 18(3), 1982.

    Google Scholar 

  32. J. Nicolas and K. Yazdania. Integrity checking in deductive databases. In Logic and Databases. Plenum Press, 1978.

    Google Scholar 

  33. E. Onuegbe. Polyinstantiation, functional dependencies and multivalued dependencies. Technical report, Honeywell Internal Report, 1987.

    Google Scholar 

  34. R. Reiter. On closed-world databases. In Logic and Databases. Plenum Press, 1978.

    Google Scholar 

  35. F. Sadri and R. Kowalski. Theorem-proving approach to database integrity. In Foundations of Deductive Databases and Logic Programming. Morgan Kaufmann, 1988.

    Google Scholar 

  36. T. Su and G. Ozsoyoglu. Data dependencies and inference control in multilevel relational database systems. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.

    Google Scholar 

  37. P. Stachour and M.B. Thuraisingham. Design of LDV: A multilevel secure relational database management system. IEEE Transactions on Knowledge and Data Engineering, forthcoming.

    Google Scholar 

  38. A. Tarski. A lattice theoretical fixpoint theorem and its application. Pacific Journal of Math, 5(3), 1955.

    Google Scholar 

  39. M.B. Thuraisingham. Toward the design of a secure database/knowledge base management system, forthcoming.

    Google Scholar 

  40. M.B. Thuraisingham. Security checking in relational database management systems augmented with inference engines. Computers and Security, 6(6), 1987.

    Google Scholar 

  41. M.B. Thuraisingham. An algorithm for assigning security levels to data. Technical report, Honeywell Technical Note, October 1988.

    Google Scholar 

  42. M.B. Thuraisingham. Security in object-oriented database management systems. Journal of Object-Oriented Programming, forthcoming.

    Google Scholar 

  43. M.B. Thuraisingham, W.T. Tsai, and T. Keefe. Secure query processing using AI techniques. In Hawaii International Conference on Systems Sciences, January 1988.

    Google Scholar 

  44. J.D. Ullman. Principles of Database and Knowledge-Base Systems, Volume 1. Computer Science Press, Rockville, Maryland, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

Thuraisingham, B. (1992). Foundations of Multilevel Databases. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-2870-7_18

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-97736-2

  • Online ISBN: 978-1-4612-2870-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics