This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Controlling FD and MVD Inferences in Multilevel Relational Database Systems
December 1991 (vol. 3 no. 4)
pp. 474-485

The authors investigate the inference problems due to functional dependencies (FD) and multivalued dependencies (MVD) in a multilevel relational database (MDB) with attribute and record classification schemes, respectively. The set of functional dependencies to be taken into account in order to prevent FD-compromises is determined. It is proven that incurring minimum information loss to prevent compromises is an NP-complete problem. An exact algorithm to adjust the attribute levels so that no compromise due to functional dependencies occurs is given. Some necessary and sufficient conditions for MVD-compromises are presented. The set of MVDs to be taken into account for controlling inferences is determined. An algorithm to prevent MVD-compromises in a relation with conflict-free MVDs is given.

[1] W. Armstrong, "Dependency structure of database relationship,"Proc. IFIP, pp. 580-583, 1974.
[2] C. Beeri, "On the membership problem for functional and multivalued dependencies in relational databases, "ACM Trans. Database Syst., vol. 5, no. 3, pp. 241-259, Sept. 1980.
[3] C. Beeri, R. Fagin, and J.H. Howard, "A complete axiomatization for functional and multivalued dependencies," inProc. ACM SIGMOD Conf., 1977, pp. 47-61.
[4] D. E. Denning, "Cryptographic checksums for multilevel data security," inProc. 1984 Symp. Security and Privacy, IEEE Computer Society, 1984, pp. 52-61.
[5] D. E. Denning, "Commutative filters for reducing inference threats in multilevel database systems," inProc. 1985 Symp. Security and Privacy, IEEE Computer Society, 1985, pp. 134-146.
[6] D. E. Denninget al., "A multilevel relational data model," inProc. 1987 Symp. Security and Privacy, IEEE Computer Society, 1987, pp. 220-234.
[7] D. E. Denninget al., "The SeaView security model," inProc. 1988 Symp. Security and Privacy, IEEE Computer Society, 1988, pp. 218-233.
[8] M. R. Garey and D. S. Johnson,Computers and Intractability: A Guide to Theory of NP-Completeness. San Francisco, CA: Freeman, 1979.
[9] R.D. Graubart, "The integrity-lock approach to secure database management, " inProc. 1984 Symp. Security and Privacy, IEEE Computer Society, 1984, pp. 62-74.
[10] R. D. Graubart and K. J. Duffy, "Design overview for retrofitting integrity-lock architecture onto a commercial DBMS," inProc. 1985 Symp. Security and Privacy, IEEE Computer Society, 1985, pp. 147-159.
[11] Y. E. Lien, "On the equivalence of database models,"J. ACM, vol. 29, no. 2, pp. 333-362, 1982.
[12] T. F. Lunt, R. R. Schell, W. R. Shockley, M. Heckman, and D. Warren, "A near-term design for the SeaView-Multilevel Database System," inProc. 1988 IEEE Symp. on Security and Privacy, Apr. 1988, pp. 234-244.
[13] D. Maier,The Theory of Relational Databases. Rockville, MD: Computer Science Press, 1983.
[14] M. Morgenstern, "Security and inference in multilevel database and knowledge-based systems," inProc. ACM SIGMOD Conf., May 1987, pp. 357-373.
[15] M. Morgenstern, "Controlling logical inference in multilevel database systems," inProc. 1988 IEEE Symp. on Security and Privacy, Apr. 1988, pp. 245-256.
[16] E. Scior, "Real-world MVD's," inProc. ACM SIGMOD Conf., 1981, pp. 121-132.
[17] J. D. Ullman,Principles of Databases Systems. Rockville, MD: Computer Science Press, 1982.

Index Terms:
FD inferences; attribute classification; MVD inferences; functional dependencies; multivalued dependencies; multilevel relational database; record classification; FD-compromises; minimum information loss; NP-complete problem; exact algorithm; necessary and sufficient conditions; MVD-compromises; conflict-free MVDs; computational complexity; database theory; inference mechanisms; relational databases
Citation:
T.-A. Su, G. Ozsoyoglu, "Controlling FD and MVD Inferences in Multilevel Relational Database Systems," IEEE Transactions on Knowledge and Data Engineering, vol. 3, no. 4, pp. 474-485, Dec. 1991, doi:10.1109/69.109108
Usage of this product signifies your acceptance of the Terms of Use.