Abstract
This report provides a summary of the issues raised in an afternoon discussion at the First Invitational Workshop on Database Security, hosted by SRI International in Menlo Park, CA. The topic of the discussion was to review the pros and cons of the various approaches to the design of secure database systems as described by the speakers that morning. However, the actual discussion quickly narrowed to the problems of aggregation and inference, particularly with regards to proposals for handling these problems in the systems described. Because these topics became primary areas of study throughout the workshop, the session described below must be regarded as only a preliminary discussion of issues that were explored in greater detail (and with greater collective insight!) in later sessions. For this reason, we have felt it appropriate to append a section entitled “retrospective,” relating the preliminary topics raised during our discussion session with the insights gained later in the workshop.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
S. G. Akl and D.E. Denning. Checking classification constraints for consistency and completeness. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.
[DAH+87]_D.E. Denning, S.G. Akl, M. Heckman, T.F. Lunt, M. Morgenstern, P.G. Neumann, and R.R. Schell. Views for multilevel database security. IEEE Transactions on Software Engineering, 13(2), February 1987.
[DLS+88]_D.E. Denning, T.F. Lunt, R.R. Schell, W.R. Shockley, and M. Heckman. The Sea View security model. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
D.E. Denning and M. Morgenstern. Military database technology study: AI techniques for security and reliability. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, 1986.
T.H. Hinke. Inference aggregation detection in database management systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
[LSS+88]_T.F. Lunt, R.R. Schell, W.R. Shockley, M. Heckman, and D. Warren. A near-term design for the SeaView multilevel database system. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
M. Morgenstern. Controlling logical inference in multilevel database systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
P. Stachour, B. Thuraisingham, and P. Dwyer. Update processing in LDV. In Proceedings of the 11th National Computer Security Conference, Baltimore, Maryland, October 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
Denning, D.E., Shockley, W.R. (1992). Discussion: Pros and Cons of the Various Approaches. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_8
Download citation
DOI: https://doi.org/10.1007/978-1-4612-2870-7_8
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97736-2
Online ISBN: 978-1-4612-2870-7
eBook Packages: Springer Book Archive