Multi-level security in database management systems
Computers and Security
Security checking in relational database management systems augmented with inference engines
Computers and Security
A theorem-proving approach to database integrity
Foundations of deductive databases and logic programming
Secure Query-Processing Strategies
Computer
Towards the design of a secure data/knowledge base management system
Data & Knowledge Engineering
SQL extensions for security assertions
Computer Standards & Interfaces
Operating system support for database management
Communications of the ACM
A relational model of data for large shared data banks
Communications of the ACM
Principles of Database Systems
Principles of Database Systems
An Introduction to Database Systems
An Introduction to Database Systems
Checking Consistency of Database Constraints: a Logical Basis
VLDB '86 Proceedings of the 12th International Conference on Very Large Data Bases
Mandatory security in object-oriented database systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
Computing transitive closures of multilevel relations
ACM SIGMOD Record
ACM SIGMOD Record - Directions for future database research & development
Current status of R&D in trusted database management systems
ACM SIGMOD Record
Concurrency control in trusted database management systems: a survey
ACM SIGMOD Record
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Security Constraint Processing in a Multilevel Secure Distributed Database Management System
IEEE Transactions on Knowledge and Data Engineering
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures
IEEE Transactions on Knowledge and Data Engineering
Constraints, Inference Channels and Secure Databases
CP '02 Proceedings of the 6th International Conference on Principles and Practice of Constraint Programming
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
The inference problem and updates in relational databases
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
Generalized XML security views
Proceedings of the tenth ACM symposium on Access control models and technologies
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Auditing Inference Based Disclosures in Dynamic Databases
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Multilevel secure rules and its impact on the design of active database systems
BNCOD'03 Proceedings of the 20th British national conference on Databases
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Suppressing microdata to prevent classification based inference
The VLDB Journal — The International Journal on Very Large Data Bases
Dynamic disclosure monitor (D2Mon): an improved query processing solution
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
A scheme for inference problems using rough sets and entropy
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
A model-theoretic approach to data anonymity and inference control
Proceedings of the second ACM conference on Data and Application Security and Privacy
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Event detection in multilevel secure active databases
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |
The authors describe the design of a secure database system,LDV (Lock Data Views), that builds upon the classical security policies for operating systems. LDV is hosted on the LOgical Coprocessing Kernel (LOCK) Trusted Computing Base (TCB). LDVs security policy builds on the security policy of LOCK. Its design is based on three assured pipelines for the query, update, and metadata management operations. The authors describe the security policy of LDV, its system architecture, the designs of the query processor, the update processor, the metadata manager, and the operating system issues. LDVs solutions to the inference and aggregation problems are also described.