Specification and Enforcement of Classification and Inference Constraints
نویسندگان
چکیده
Although mandatory access control in database systems has been extensively studied in recent years, and several models and systems have been proposed, capabilities for enforcement of mandatory constraints remain limited. Lack of support for expressing and combating inference channels that improperly leak protected information remains a major limitation in today’s multilevel systems. Moreover, the working assumption that data are classified at insertion time makes previous approaches inapplicable to the classification of existing, possibly historical, data repositories that need to be classified for release. Such a capability would be of great benefit to, and appears to be in demand by, governmental, public, and private institutions. We address the problem of classifying existing data repositories by taking into consideration explicit data classification as well as association and inference constraints. Constraints are expressed in a unified, DBMSand modelindependent framework, making the approach largely applicable. We introduce the concept of minimal classification as a labeling of data elements that, while satisfying the constraints, ensures that no data element is classified at a level higher than necessary. We also describe a technique and present an algorithm for generating data classifications that are both minimal and preferred according to certain criteria. Our approach is based on preprocessing, or compiling, constraints to produce a set of simple classification assignments that can then be efficiently applied to classify any database instance. This work was supported in part by the National Science Foundation under grant ECS-94-22688 and by DARPA/Rome Laboratory under contract F30602-96-C-0337. yThis work was performed while the author was visiting SRI International, Computer Science Laboratory, supported in part by the National Science Foundation under grant ECS-94-22688. zOn leave from Università di Milano. Author’s permanent address: Università di Milano, Polo Didattico e di Ricerca di Crema, Via Bramante 65, 26013 Crema Italy; e-mail: [email protected].
منابع مشابه
Heuristic constraints enforcement for training of and rule extraction from a fuzzy/neural architecture. II. Implementation and application
This paper is the second of two companion papers. The foundations of the proposed method of heuristic constraint enforcement on membership functions for knowledge extraction from a fuzzy/neural architecture was given in Part I. Part II develops methods for forming constraint sets using the constraints and techniques for finding acceptable solutions that conform to all available a priori informa...
متن کاملDetection of Breast Cancer Progress Using Adaptive Nero Fuzzy Inference System and Data Mining Techniques
Prediction, diagnosis, recovery and recurrence of the breast cancer among the patients are always one of the most important challenges for explorers and scientists. Nowadays by using of the bioinformatics sciences, these challenges can be eliminated by using of the previous information of patients records. In this paper has been used adaptive nero fuzzy inference system and data mining techniqu...
متن کاملSimulation Verification and Validation by Dynamic Policy Specification and Enforcement
This article presents a new verification and validation technique for simulation using dynamic policy specification and enforcement. Security requirements, certain functional requirements, and constraints can be formally specified as policies, and they are used to check at runtime whether the behaviors of the system under simulation are within the given constraints. A policy violation reveals a...
متن کاملSpecification of History Based Constraints for Access Control in Conceptual Level
An access control model for Semantic Web should take the semantic relationships among the entities, defined in the abstract conceptual level (i.e., ontology level), into account. Authorization and policy specification based on a logical model let us infer implicit security policies from the explicit ones based on the defined semantic relationships in the domains of subjects, objects, and action...
متن کاملThyroid disorder diagnosis based on Mamdani fuzzy inference system classifier
Introduction: Classification and prediction are two most important applications of statistical methods in the field of medicine. According to this note that the classical classification are provided due to the clinical symptom and do not involve the use of specialized information and knowledge. Therefore, using a classifier that can combine all this information, is necessary. The aim of this s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999