Providing Security and Interoperation of HeterogeneousSystems

  • Authors:
  • Steven Dawson;Shelly Qian;Pierangela Samarati

  • Affiliations:
  • Computer Science Laboratory, SRI International, Menlo Park, CA 94025, USA. dawson@csl.sri.com;SecureSoft, Inc., 275 Shoreline Dr., Suite 520, Redwood Shores, CA 94065, USA. sqian@securesoft.com;Università di Milano, Dip. Scienze Informazione, Polo di Crema, 26013 Crema, Italy. samarati@dsi.unimi.it

  • Venue:
  • Distributed and Parallel Databases - Security of data and transaction processing
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Interoperation and information sharing among databasesindependently developed and maintained by different organizations istoday a pressing need, if not a practice. Governmental, military,financial, medical, and private institutions are more and morerequired to become part of a distributed infrastructure andselectively share their data with other organizations. This sharingprocess inevitably opens the local system to new vulnerabilities andenlarges the space of possible threats to the data and resources itmaintains. As a complicating factor, in general, data sources areheterogeneous both in the data models they adopt and in the securitymodels by which protection requirements are stated. We present amodeling and architectural solution to the problem of providinginteroperation while preserving autonomy and security of the localsources based on the use of wrappers and a mediator. A wrapperassociated with each source provides a uniform data interface and amapping between the source's security lattice and other lattices. The mediator processes global access requests by interfacingapplications and data sources. The combination of wrappers andmediator thus provides a uniform data model interface and allows themapping between restrictions stated by the different securitypolicies. We describe the practical application of these ideas tothe problem of trusted interoperation of health care databases,targeted to enforcing security in distributed applications referringto independent heterogeneous sources protected by mandatory policyrestrictions. We describe the architecture and operation of thesystem developed, and describe the tasks of the different components.