A Kernel Design for a Secure Data Base Management System.
Deborah Downs, Gerald J. Popek:
A Kernel Design for a Secure Data Base Management System.
VLDB 1977: 507-514@inproceedings{DBLP:conf/vldb/DownsP77,
author = {Deborah Downs and
Gerald J. Popek},
title = {A Kernel Design for a Secure Data Base Management System},
booktitle = {Proceedings of the Third International Conference on Very Large
Data Bases, October 6-8, 1977, Tokyo, Japan},
publisher = {IEEE Computer Society},
year = {1977},
pages = {507-514},
ee = {db/conf/vldb/DownsP77.html},
crossref = {DBLP:conf/vldb/77},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Abstract
The need for reliable protection facilities, which allow controlled sharing of data
in multi-user data base management systems, is steadily growing. This paper first
discusses concepts relevant to such protection facilities, including
data security,
object grenularity, data incependence, and software certification. Those system
characteristics required for reliable security and suitable functiorality are listec.
The facilities which an operating system must provide in support of a such date base
management system also are outlined. A kernel based data base management system
architecture is then presented which supports value independent security and allows
various grains of protection down to the size of comains in relations. It is shown
that the proposed structure can substantially improve the reliability of protection
in data bases.
Copyright © 1977 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
Printed Edition
Proceedings of the Third International Conference on Very Large Data Bases, October 6-8, 1977, Tokyo, Japan.
IEEE Computer Society 1977
Contents
References
- [1]
- Morton M. Astrahan, Mike W. Blasgen, Donald D. Chamberlin, Kapali P. Eswaran, Jim Gray, Patricia P. Griffiths, W. Frank King III, Raymond A. Lorie, Paul R. McJones, James W. Mehl, Gianfranco R. Putzolu, Irving L. Traiger, Bradford W. Wade, Vera Watson:
System R: Relational Approach to Database Management.
ACM Trans. Database Syst. 1(2): 97-137(1976)

- [2]
- Peter S. Browne, Dennis D. Steinauer:
A Model for Access Control.
SIGFIDET Workshop 1971: 241-262

- [3]
- Donald D. Chamberlin, Raymond F. Boyce, Irving L. Traiger:
A Deadlock-Free Scheme for Resource Locking in a Data-Base Environment.
IFIP Congress 1974: 340-343

- [4]
- ...
- [5]
- Richard W. Conway, William L. Maxwell, Howard L. Morgan:
On the Implementation of Security Measures in Information Systems.
Commun. ACM 15(4): 211-220(1972)

- [6]
- E. F. Codd:
A Relational Model of Data for Large Shared Data Banks.
Commun. ACM 13(6): 377-387(1970)

- [7]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976)

- [8]
- C. J. Date, P. Hopewell:
File Definition and Logical Data Independence.
SIGFIDET Workshop 1971: 117-138

- [9]
- ...
- [10]
- Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman:
An Authorization Model for a Shared Data Base.
SIGMOD Conference 1975: 23-31

- [11]
- ...
- [12]
- ...
- [13]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976)

- [14]
- H. Rex Hartson, David K. Hsiao:
A Semantic Model for Data Base Protection Languages.
VLDB 1976: 27-42

- [15]
- Gerald Held, Michael Stonebraker:
Storage Structures and Access Methods in the Relational Data Base Management System INGRES.
ACM Pacific 1975: 26-33

- [16]
- ...
- [17]
- ...
- [18]
- ...
- [19]
- Butler W. Lampson:
A Note on the Confinement Problem.
Commun. ACM 16(10): 613-615(1973)

- [20]
- Jack Minker:
Performing Inferences over Relation Data Bases.
SIGMOD Conference 1975: 79-91

- [21]
- Richard C. Owens Jr.:
Evaluation of Access Authorization Characteristics of Derived Data Sets.
SIGFIDET Workshop 1971: 263-278

- [22]
- ...
- [23]
- ...
- [24]
- ...
- [25]
- ...
- [26]
- ...
- [27]
- ...
Copyright © Tue Mar 16 02:21:55 2010
by Michael Ley (ley@uni-trier.de)