Skip to main content

An Investigation of Secure Distributed DBMS Architectures

  • Chapter
Research Directions in Database Security

Abstract

The objective of this paper is to describe an architecture for a multilevel secure distributed database management system (SD-DBMS). This work was part of a project, funded by Rome Air Development Center (RADC), to design a multilevel secure (MLS) database management system (DBMS) capable of processing information at a minimum of three classification levels and/or categories. The SD-DBMS was designed in accordance with the Trusted Computer System Evaluation Criteria (TCSEC) requirements for a Class B3 trusted computer system [Cen85b].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Committee on Multilevel Data Management Security Air Force Summer Study. Multilevel data management security. Technical report, Air Force Studies Board, National Research Council, National Academy Press, 1983. For Official Use Only.

    Google Scholar 

  2. National Computer Security Center. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, December 1985.

    Google Scholar 

  3. E.F. Codd. A relational model for large shared data banks. Communications of the ACM, 13(6), June 1970.

    Google Scholar 

  4. C. J. Date. An Introduction to Database Systems, Volume I. Addison-Wesley, Reading, Massachusetts, 4th edition, 1986.

    Google Scholar 

  5. D.E. Denning. Cryptography and Data Security. Addison-Wesley, Reading, Massachusetts, 1982.

    MATH  Google Scholar 

  6. D.E. Denning. Cryptographic checksums for multilevel data security. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, 1984.

    Google Scholar 

  7. Deborah Downs and Gerald J. Popek. Data base management systems security and INGRES. In Proceedings of Fifth International Conference on Very Large Data Bases, October 1979.

    Google Scholar 

  8. R.D. Graubart. The integrity-lock approach to secure database management. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, 1984.

    Google Scholar 

  9. T.H. Hinke, J.O. Solomon, and J.P. Dempsey. Design considerations for secure database management systems. Technical Report TM-7526/100/01, January 13 1986.

    Google Scholar 

  10. T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, and W.R. Shockley. Final report Vol. 2: The SeaView formal security policy model. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, 1989.

    Google Scholar 

  11. J.P. O’Connor, J.W. Gray, C. Jensen, and D.T. Westby-Gibson. Secure distributed database management system (SD-DBMS), Volume i: Architecture definition, tradeoff analysis. Technical report, Unisys System Development Group, August 1988.

    Google Scholar 

  12. James P. O’Connor and James W. Gray III. A distributed architecture for multilevel database security. In Proceedings of the 11th National Computer Security Conference, October 1988.

    Google Scholar 

  13. Michael Stonebraker. Implementation of integrity constraints and views by query modification. In Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1975.

    Google Scholar 

  14. [SW74] M. Stonebraker and E. Wong. Access control in a relational data base management system by query modification. In Proceedings of the 1974 ACM Annual Conference, 1974.

    Google Scholar 

  15. Unisys. Secure distributed database management system: State-of-the-art survey. Technical Report TM-WD-8905/017/00, November 9 1987.

    Google Scholar 

  16. Unisys. Secure distributed database management system (sd-dbms): Security policy. Technical Report TM-WD-8905/020/00, Pending.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

O’Connor, J.P., Gray, J.W., McCollum, C., Notargiacomo, L. (1992). An Investigation of Secure Distributed DBMS Architectures. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-2870-7_4

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-97736-2

  • Online ISBN: 978-1-4612-2870-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics