Abstract
Although multi-level secure operating systems have been a reality for several years, their use has yet to become widespread. This is due, in part, to the lack of secure software available for such systems, in particular to the lack of secure software for data-intensive applications, for which multi-level secure databases are a necessity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S.G. Akl and D.E. Denning. Checking classification constraints for consistency and completeness. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
T.A. Berson and T.F. Lunt. Multilevel security for knowledge-based systems. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
D.D. Clark and D.R. Wilson. A comparison of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987.
T.H. Hinke. Inference aggregation detection in database management systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
T.F. Lunt and T.A. Berson. An expert system to classify and sanitize text. In Proceedings of the Third Aerospace Computer Security Conference, December 1987.
C.E. Landwehr, C.L. Heitmeyer, and J. McLean. A security model for military message systems. ACM Transactions on Computer Systems, 2(3), August 1984.
M. Morgenstern. Controlling logical inference in multilevel database systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
T. Su and G. Ozsoyoglu. Data dependencies and inference control in multilevel relational database systems. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
M.B. Thuraisingham. Security checking in relational database management systems augmented with inference engines. Computers and Security, 6(6), 1987.
S.T. Vinter. Extended discretionary access controls. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
Meadows, C. (1992). New Approaches to Database Security: Report on Discussion. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_20
Download citation
DOI: https://doi.org/10.1007/978-1-4612-2870-7_20
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97736-2
Online ISBN: 978-1-4612-2870-7
eBook Packages: Springer Book Archive