Security constraint processing in a multilevel secure distributed database management system
B Thuraisingham, W Ford - IEEE Transactions on Knowledge …, 2002 - ieeexplore.ieee.org
… security constraints in a centralized environment. We believe that processing security constraints
is … In this paper, we extend our previous work on constraint processing in a centralized …
is … In this paper, we extend our previous work on constraint processing in a centralized …
Multilevel security issues in distributed database management systems II
B Thuraisingham - Computers & Security, 1991 - Elsevier
… database management systems (MIS/DBMS) … , multilevel secure distributed database
management systems (MIS/… DCP is responsible for handling security constraints during query and …
management systems (MIS/… DCP is responsible for handling security constraints during query and …
Security constraint processing during multilevel secure database design
G Pernul - Proceedings Eighth Annual Computer Security …, 1992 - computer.org
… the design of the database.In the following we outline security constraints that arecaptured
by the proposed design technique.Simple Constraints are constraints that classify adatabase, …
by the proposed design technique.Simple Constraints are constraints that classify adatabase, …
[PDF][PDF] Inference problems in multilevel secure database management systems
… security class can use his or her knowledge of the low security class data and of the constraint
… ) to infer information about high security class data also affected by the constraint. In this …
… ) to infer information about high security class data also affected by the constraint. In this …
[PDF][PDF] Design of LDV: A multilevel secure relational database management system
PD Stachour, B Thuraisingham - IEEE Transactions on …, 1990 - scholar.archive.org
… Checking for consistency of a set of constraints was one of the more difficult tasks in the … to
ensure that the security constraints are defined in such a way that there is no security violation. …
ensure that the security constraints are defined in such a way that there is no security violation. …
[PDF][PDF] An introduction to multilevel secure relational database management systems
W Rjaibi - Proceedings of the 2004 conference of the Centre for …, 2004 - researchgate.net
… (RDBMS) are at the heart of the DoD’s information system, significant research and
development efforts have been put into building multilevel secure RDBMS, which have led to the …
development efforts have been put into building multilevel secure RDBMS, which have led to the …
Multi-level security model developed to provide data privacy in distributed database systems
M Guclu - Tehnički vjesnik, 2022 - hrcak.srce.hr
… of information security. In this study with the aim to develop a multi-level access control
method, Improved Bell-LaPadula security model has been adopted to distributed systems and …
method, Improved Bell-LaPadula security model has been adopted to distributed systems and …
Security implications of distributed database management system models
CS Kumar, J Seetha, SR Vinotha - arXiv preprint arXiv:1401.7733, 2014 - arxiv.org
… and multilevel access … the security constraints of the database as the security conditions of
the organization change and as the security characteristics of the data stored in the database …
the organization change and as the security characteristics of the data stored in the database …
Secure locking protocols for multilevel database management systems
… seems useful if we do not allow database integrity constraints to span security levels. …
include distributed database systems, transaction processing and information systems security. …
include distributed database systems, transaction processing and information systems security. …
Multilevel secure transaction processing: Status and prospects
… multilevel security constraints, discusses how they must be modified to comply with the security
… Such a distributed database consists of a collection of independent computational units …
… Such a distributed database consists of a collection of independent computational units …