Security constraint processing in a multilevel secure distributed database management system

B Thuraisingham, W Ford - IEEE Transactions on Knowledge …, 2002 - ieeexplore.ieee.org
security constraints in a centralized environment. We believe that processing security constraints
is … In this paper, we extend our previous work on constraint processing in a centralized …

Multilevel security issues in distributed database management systems II

B Thuraisingham - Computers & Security, 1991 - Elsevier
database management systems (MIS/DBMS) … , multilevel secure distributed database
management systems (MIS/… DCP is responsible for handling security constraints during query and …

Security constraint processing during multilevel secure database design

G Pernul - Proceedings Eighth Annual Computer Security …, 1992 - computer.org
… the design of the database.In the following we outline security constraints that arecaptured
by the proposed design technique.Simple Constraints are constraints that classify adatabase, …

[PDF][PDF] Inference problems in multilevel secure database management systems

S Jajodia, C Meadows - … Security: An integrated collection of essays, 1995 - academia.edu
security class can use his or her knowledge of the low security class data and of the constraint
… ) to infer information about high security class data also affected by the constraint. In this …

[PDF][PDF] Design of LDV: A multilevel secure relational database management system

PD Stachour, B Thuraisingham - IEEE Transactions on …, 1990 - scholar.archive.org
… Checking for consistency of a set of constraints was one of the more difficult tasks in the … to
ensure that the security constraints are defined in such a way that there is no security violation. …

[PDF][PDF] An introduction to multilevel secure relational database management systems

W Rjaibi - Proceedings of the 2004 conference of the Centre for …, 2004 - researchgate.net
… (RDBMS) are at the heart of the DoD’s information system, significant research and
development efforts have been put into building multilevel secure RDBMS, which have led to the …

Multi-level security model developed to provide data privacy in distributed database systems

M Guclu - Tehnički vjesnik, 2022 - hrcak.srce.hr
… of information security. In this study with the aim to develop a multi-level access control
method, Improved Bell-LaPadula security model has been adopted to distributed systems and …

Security implications of distributed database management system models

CS Kumar, J Seetha, SR Vinotha - arXiv preprint arXiv:1401.7733, 2014 - arxiv.org
… and multilevel access … the security constraints of the database as the security conditions of
the organization change and as the security characteristics of the data stored in the database

Secure locking protocols for multilevel database management systems

S Jajodia, LV Mancini, I Ray - Database Security: Status and prospects, 1997 - Springer
… seems useful if we do not allow database integrity constraints to span security levels. …
include distributed database systems, transaction processing and information systems security. …

Multilevel secure transaction processing: Status and prospects

V Atluri, S Jajodia, TF Keefe, C McCollum… - Database Security …, 1997 - Springer
multilevel security constraints, discusses how they must be modified to comply with the security
… Such a distributed database consists of a collection of independent computational units …