Distributed databases principles and systems
Distributed databases principles and systems
Multi-level security in database management systems
Computers and Security
Foundations of logic programming; (2nd extended ed.)
Foundations of logic programming; (2nd extended ed.)
Security checking in relational database management systems augmented with inference engines
Computers and Security
Foundations of semantic query optimization for deductive databases
Foundations of deductive databases and logic programming
Secure Query-Processing Strategies
Computer
Towards the design of a secure data/knowledge base management system
Data & Knowledge Engineering
Multilevel security issues in distributed database management systems II
Computers and Security
Design and implementation of a query processor for a trusted distributed data base management system
Journal of Systems and Software
Logic and Data Bases
Design of LDV: A Multilevel Secure Relational Database Management
IEEE Transactions on Knowledge and Data Engineering
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Data management research at the MITRE Corporation
ACM SIGMOD Record
Journal of Intelligent Information Systems
ICDT '99 Proceedings of the 7th International Conference on Database Theory
Data mining, national security, privacy and civil liberties
ACM SIGKDD Explorations Newsletter
Cascade of Distributed and Cooperating Firewalls in a Secure Data Network
IEEE Transactions on Knowledge and Data Engineering
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering
Privacy constraint processing in a privacy-enhanced database management system
Data & Knowledge Engineering
Security and privacy for multimedia database management systems
Multimedia Tools and Applications
View disassembly: A rewrite that extracts portions of views
Journal of Computer and System Sciences
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Security standards for the semantic web
Computer Standards & Interfaces
Secure model management operations for the web
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Hi-index | 0.00 |
In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification policy. They can be used to assign security levels to the data based on content, context, and time. In this paper we extend our previous work on security constraint processing in a centralized multilevel secure database management system by describing techniques for processing security constraints in a distributed environment during query, update, and database design operations.