Abstract
The objective of this paper is to describe an architecture for a multilevel secure distributed database management system (SD-DBMS). This work was part of a project, funded by Rome Air Development Center (RADC), to design a multilevel secure (MLS) database management system (DBMS) capable of processing information at a minimum of three classification levels and/or categories. The SD-DBMS was designed in accordance with the Trusted Computer System Evaluation Criteria (TCSEC) requirements for a Class B3 trusted computer system [Cen85b].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Committee on Multilevel Data Management Security Air Force Summer Study. Multilevel data management security. Technical report, Air Force Studies Board, National Research Council, National Academy Press, 1983. For Official Use Only.
National Computer Security Center. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, December 1985.
E.F. Codd. A relational model for large shared data banks. Communications of the ACM, 13(6), June 1970.
C. J. Date. An Introduction to Database Systems, Volume I. Addison-Wesley, Reading, Massachusetts, 4th edition, 1986.
D.E. Denning. Cryptography and Data Security. Addison-Wesley, Reading, Massachusetts, 1982.
D.E. Denning. Cryptographic checksums for multilevel data security. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, 1984.
Deborah Downs and Gerald J. Popek. Data base management systems security and INGRES. In Proceedings of Fifth International Conference on Very Large Data Bases, October 1979.
R.D. Graubart. The integrity-lock approach to secure database management. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, 1984.
T.H. Hinke, J.O. Solomon, and J.P. Dempsey. Design considerations for secure database management systems. Technical Report TM-7526/100/01, January 13 1986.
T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, and W.R. Shockley. Final report Vol. 2: The SeaView formal security policy model. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, 1989.
J.P. O’Connor, J.W. Gray, C. Jensen, and D.T. Westby-Gibson. Secure distributed database management system (SD-DBMS), Volume i: Architecture definition, tradeoff analysis. Technical report, Unisys System Development Group, August 1988.
James P. O’Connor and James W. Gray III. A distributed architecture for multilevel database security. In Proceedings of the 11th National Computer Security Conference, October 1988.
Michael Stonebraker. Implementation of integrity constraints and views by query modification. In Proceedings of the ACM SIGMOD International Conference on Management of Data, May 1975.
[SW74] M. Stonebraker and E. Wong. Access control in a relational data base management system by query modification. In Proceedings of the 1974 ACM Annual Conference, 1974.
Unisys. Secure distributed database management system: State-of-the-art survey. Technical Report TM-WD-8905/017/00, November 9 1987.
Unisys. Secure distributed database management system (sd-dbms): Security policy. Technical Report TM-WD-8905/020/00, Pending.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
O’Connor, J.P., Gray, J.W., McCollum, C., Notargiacomo, L. (1992). An Investigation of Secure Distributed DBMS Architectures. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_4
Download citation
DOI: https://doi.org/10.1007/978-1-4612-2870-7_4
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97736-2
Online ISBN: 978-1-4612-2870-7
eBook Packages: Springer Book Archive