The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - April (1995 vol.7)
pp: 274-293
ABSTRACT
<p><it>Abstract</it>—In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification policy. They can be used to assign security levels to the data based on content, context, and time. In this paper we extend our previous work on security constraint processing in a centralized multilevel secure database management system by describing techniques for processing security constraints in a distributed environment during query, update, and database design operations.</p>
INDEX TERMS
Multilevel secure distributed database management system, security constraints, inference problem, security policy, distributed query processing, distributed update processing, multilevel distributed database design.
CITATION
Bhavani Thuraisingham, William Ford, "Security Constraint Processing in a Multilevel Secure Distributed Database Management System", IEEE Transactions on Knowledge & Data Engineering, vol.7, no. 2, pp. 274-293, April 1995, doi:10.1109/69.382297
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool