Secure Mediated Databases
نویسندگان
چکیده
With the evolution of the information superhigh-way, there is now an immense amount of information available in a wide variety of databases. Furthermore , users often have the ability to access legacy software packages developed by external sources. However, sometimes both the information provided by a data source, as well as one or more of the functions available through a software package may be sensitive { in such cases, organizations require that access by users be controlled. HERMES (\HEterogeneous Reasoning and MEdiator System") is a platform that has been developed at the University of Maryland within which mediators may be designed and implemented. HER-MES has already been used for a number of applications 7, 3]. In this paper, we will provide a formal model of security in mediated systems. We will then develop techniques that are sound and complete and respect security constraints of packages/databases participating in the mediated system. The security constraints described in this paper have been implemented { we will describe the existing implementation.
منابع مشابه
A Secure Kernelized Architecture for Multiple Object-Oriented Databases
We present a secure kernelized architecture for multilevel object-oriented database management systems. Our architecture is based on the notion of a message lter proposed by Jajodia and Kogan. It builds upon the typical architecture of current object-oriented database management systems. Since the operations mediated by the message lter are arbitrarily complex operations (as opposed to primitiv...
متن کاملFoundations of Secure Deductive Databases
In this paper, we develop a formal logical foundation for secure deductive databases. This logical foundation is based on an extended logic involving several modal operators. We develop two models of interaction between the user and the database called “yes-no” dialogs, and “yes-no-don’t know” dialogs. Both dialog frameworks allow the database to lie to the user. W e develop an algorithm for an...
متن کاملSecure Regression on Distributed Databases
This article presents several methods for performing linear regression on the union of distributed databases that preserve, to varying degrees, confidentiality of those databases. Such methods can be used by federal or state statistical agencies to share information from their individual databases, or to make such information available to others. Secure data integration, which provides the lowe...
متن کاملThe non-primitiveness of the simple-security property and its non-applicability to relational databases
Many works on secure databases state the Simple-Security-property as a postulate the necessity of which for achieving confidentiality seems to be out of question. We show that this property is not a postulate but a conclusion the validity of which relies on the assumptions made about the underlying secure environment. We then demonstrate that it contradicts the assumptions made by relational an...
متن کاملSecure, Privacy-Preserving Analysis of Distributed Databases
There is clear value, in both industrial and government settings, derived from performing statistical analyses that, in effect, integrate data in multiple, distributed databases. However, the barriers to actually integrating the data can be substantial or even insurmountable. Corporations may be unwilling to share proprietary databases such as chemical databases held by pharmaceutical manufactu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996