Skip to main content

Discussion: Pros and Cons of the Various Approaches

  • Chapter
Research Directions in Database Security

Abstract

This report provides a summary of the issues raised in an afternoon discussion at the First Invitational Workshop on Database Security, hosted by SRI International in Menlo Park, CA. The topic of the discussion was to review the pros and cons of the various approaches to the design of secure database systems as described by the speakers that morning. However, the actual discussion quickly narrowed to the problems of aggregation and inference, particularly with regards to proposals for handling these problems in the systems described. Because these topics became primary areas of study throughout the workshop, the session described below must be regarded as only a preliminary discussion of issues that were explored in greater detail (and with greater collective insight!) in later sessions. For this reason, we have felt it appropriate to append a section entitled “retrospective,” relating the preliminary topics raised during our discussion session with the insights gained later in the workshop.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. G. Akl and D.E. Denning. Checking classification constraints for consistency and completeness. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, April 1987.

    Google Scholar 

  2. [DAH+87]_D.E. Denning, S.G. Akl, M. Heckman, T.F. Lunt, M. Morgenstern, P.G. Neumann, and R.R. Schell. Views for multilevel database security. IEEE Transactions on Software Engineering, 13(2), February 1987.

    Google Scholar 

  3. [DLS+88]_D.E. Denning, T.F. Lunt, R.R. Schell, W.R. Shockley, and M. Heckman. The Sea View security model. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  4. D.E. Denning and M. Morgenstern. Military database technology study: AI techniques for security and reliability. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, 1986.

    Google Scholar 

  5. T.H. Hinke. Inference aggregation detection in database management systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  6. [LSS+88]_T.F. Lunt, R.R. Schell, W.R. Shockley, M. Heckman, and D. Warren. A near-term design for the SeaView multilevel database system. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  7. M. Morgenstern. Controlling logical inference in multilevel database systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  8. P. Stachour, B. Thuraisingham, and P. Dwyer. Update processing in LDV. In Proceedings of the 11th National Computer Security Conference, Baltimore, Maryland, October 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

Denning, D.E., Shockley, W.R. (1992). Discussion: Pros and Cons of the Various Approaches. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-2870-7_8

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-97736-2

  • Online ISBN: 978-1-4612-2870-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics