On knowledge base management systems: integrating artificial intelligence and d atabase technologies
Multi-level security in database management systems
Computers and Security
Security checking in relational database management systems augmented with inference engines
Computers and Security
A theorem-proving approach to database integrity
Foundations of deductive databases and logic programming
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
Mandatory security in object-oriented database systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
Current status of R&D in trusted database management systems
ACM SIGMOD Record
Design of LDV: A Multilevel Secure Relational Database Management
IEEE Transactions on Knowledge and Data Engineering
Security Constraint Processing in a Multilevel Secure Distributed Database Management System
IEEE Transactions on Knowledge and Data Engineering
The inference problem and updates in relational databases
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
RDF metadata for XML access control
Proceedings of the 2003 ACM workshop on XML security
Proceedings of the 11th ACM conference on Computer and communications security
Privacy constraint processing in a privacy-enhanced database management system
Data & Knowledge Engineering
Dynamic disclosure monitor (D2Mon): an improved query processing solution
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
FGAC-QD: fine-grained access control model based on query decomposition strategy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
A scheme for inference problems using rough sets and entropy
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
Hi-index | 4.10 |
Strategies for secure query processing multilevel-security database management systems are proposed. They are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants-adding environmental information and using graphs-are described. The performance of the strategies is examined.