Advertisement

Applicability of temporal data models to query multilevel security databases: A case study

  • Shashi K. Gadia
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1399)

Abstract

In a multilevel security database there are multiple beliefs about a given real world object. The ability of a database model to accommodate multiple beliefs is termed polyinstantiation in the multilevel security literature. In this paper we remark that in an abstract sense polyinstantiation is a priori present in all models for temporal and spatial databases. In particular we investigate the applicability of the parametric model for temporal data to query multilevel security data and, as a case study, compare it to a model for multilevel security given by Winslett, Smith, and Qian.

Index terms

Databases relational databases multilevel security belief data polyinstantiation temporal databases spatial databases dimensional databases 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [BG89]
    Gadia, Shashi K. and Gautam Bhargava. A 2-dimensional temporal relational database model for querying errors and updates, and for achieving zero information-loss. Technical Report 89-24. Department of Computer Science, Iowa State University, Ames, Iowa, December 1989.Google Scholar
  2. [BG90]
    Gautam Bhargava and Shashi K. Gadia. The concept of an error in a database: an application of temporal databases. Appeared in Proceedings of INSDOC COMAD'90 International Conference on Management of Data, December 1990. Also available as Tech. Report TR97-15, Computer Science Department, Iowa State University, Ames, 1997.Google Scholar
  3. [BG93]
    Bhargava, Gautam and Shashi K. Gadia. Relational database systems with zero information loss. IEEE Transactions on Knowledge and Data Engineering, Vol 5, pp76–87, 1993.CrossRefGoogle Scholar
  4. [BL75]
    Bell, D.E. and L. J. LaPadula. Secure computer systems: unified exposition and multics interpretation. Tech Report MTR-2997, MITRE, 1975Google Scholar
  5. [CS95]
    Chen, Fang and Ravi S. Sandhu. The semantics and expressive power of MLR data model. Proceedings of IEEE Symposium on Security and Privacy, 1988.Google Scholar
  6. [DLS87]
    D. Denning, T. Lunt, R. Schell, et al. A multilevel relational data model. Proceedings of IEEE Symposium on Security and Privacy, pp 220–234, 1987.Google Scholar
  7. [DLS88]
    D. Denning, T. Lunt, R. Schell, W. R. Shockley and M. Heckman. The Seaview security model. Proceedings of IEEE Symposium on Security and Privacy, pp 1988.Google Scholar
  8. [Ga86]
    Gadia, Shashi K. Weak temporal relations. ACM Transactions on Database Systems, 13(4), pp 418–448, December 1988.zbMATHCrossRefMathSciNetGoogle Scholar
  9. [Ga88]
    Gadia, Shashi K. A homogenous relational model and query languages for temporal databases. ACM Transactions on Database Systems, 13(4):418–448, December 1988.zbMATHCrossRefMathSciNetGoogle Scholar
  10. [Ga97]
    Gadia, Shashi K. A bibliography and index of our works on belief data: concept of error and multilevel security. Tech. Report TR97-13, Computer Science Department, Iowa State University, Ames, 1997.Google Scholar
  11. [GB89]
    Gadia, Shashi K. and Gautam Bhargava. A formal treatment of errors and updates in a relational database. 1988–89. An unpublished manuscript, available as Tech. Report TR97-14, Computer Science Department, Iowa State University, Ames, 1997.Google Scholar
  12. [GC95]
    Tsz Shing Cheng and Shashi K. Gadia. An algebra for belief persistence in multi-level security. Version 1, 1995. An unpublished manuscript, available as Tech. Report TR97-16, Computer Science Department, Iowa State University, Ames, 1997.Google Scholar
  13. [GC96]
    Tsz Shing Cheng and Shashi K. Gadia. An algebra for belief persistence in multi-level security. A revised version of [3] incorporating some findings from [4]. Version 2, 1996. An unpublished manuscript, available as Tech. Report TR97-18, Computer Science Department, Iowa State University, Ames, 1997.Google Scholar
  14. [GN93]
    Gadia, Shashi K. and Sunil Nair. Temporal databases: A prelude to parametric data. In [Ta+93], pp 28–66.Google Scholar
  15. [GQ95]
    Gong, L. and X. Qian. Enriching the expressive power of security labels. IEEE Transactions on Knowledge and Data Engineering, pp 839–841, Vol 7, 1995.CrossRefGoogle Scholar
  16. [GY88]
    Gadia, Shashi K. and Chuen-Sing Yeung. A generalized model for relational temporal databases. ACM SIGMOD International Conference on Management of Data, 1988, pp 251–259.Google Scholar
  17. [GY91]
    Gadia, Shashi K. and Chuen-Sing Yeung. Inadequacy of Interval Timestamps in Temporal Databases. Information Sciences, Vol 54, pp 1–22, 1991.CrossRefGoogle Scholar
  18. [HOT91]
    Haigh. J., R. O'Brien, and D. Thomsen. The LDV secure relational DBMS model. Database Security IV, pp 265–279, 1991.Google Scholar
  19. [JS90]
    Jajodia, S. and R. Sandhu. Polyinstantiation integrity in multilevel relations. Proceedings of IEEE Symposium on Research in Security and Privacy, pp 104–115, 1990.Google Scholar
  20. [JS91]
    Jajodia, S. and R. Sandhu. Toward a multilevel secure relational data model. Proceedings of ACM-SIGMOD, pp 50–59, 1991.Google Scholar
  21. [LDS90]
    Lunt, T. F., D. E. Denning, R. R. Schell, M. Heckman, and W.R. Shockley. The Seaview security model. IEEE Transactions on Software Engineering, Vol 16, pp 593–607, 1990.CrossRefGoogle Scholar
  22. [NG92]
    Nair, Sunil and Shashi K. Gadia. Algebraic optimization in a relational model for temporal databases, Proc. First International Conference on Information and Knowledge Management, pp 169–176, 1992.Google Scholar
  23. [PMP94]
    Pissinou, Niki, Kia Makki, and E. K. Park. Towards a framework for integrating secure models and temporal databases. Proc. of Third International Conference on Information and Knowledge Management, 1994, pp 280–287.Google Scholar
  24. [SW92]
    Smith K. and M. Winslett. Entity modeling in the MLS relational model. Proceedings ofEighteenth VLDB.pp 199–210, 1992.Google Scholar
  25. [Ta+93]
    Tansel, Abdullah, et al, Eds. Temporal Databases: Theory, Design, and Implementation. Benjamin/Cummings, Redwood City, California, 1993, pp 28–66.Google Scholar
  26. [WSQ94]
    Winslett, Marianne, Kenneth Smith, and Xialei Qian. Formal query languages for secure relational databases. ACM Transactions on Database Systems, Vol 19, 1994, pp 626–662.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Shashi K. Gadia
    • 1
  1. 1.Computer Science DepartmentIowa State UniversityAmes

Personalised recommendations