This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Secure query-processing strategies
March 1989 (vol. 22 no. 3)
pp. 63,64,65,66,67,68,69,70
Strategies for secure query processing multilevel-security database management systems are proposed. They are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants-adding environmental information and using graphs-are described. The performance of the strategies is examined.<>
Index Terms:
security of data,database management systems,information retrieval,performance,secure query processing multilevel-security database management systems,query modification,integrity constraints,view mechanisms,names,definitions,base relations,environmental information,graphs,Multilevel systems,Deductive databases,Access control,Data security,Authorization,Database systems,Relational databases,Proposals,Performance evaluation,Query processing
Citation:
"Secure query-processing strategies," Computer, vol. 22, no. 3, pp. 63,64,65,66,67,68,69,70, March 1989, doi:10.1109/2.16229
Usage of this product signifies your acceptance of the Terms of Use.