The Community for Technology Leaders
Green Image
<p><it>Abstract</it>—In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification policy. They can be used to assign security levels to the data based on content, context, and time. In this paper we extend our previous work on security constraint processing in a centralized multilevel secure database management system by describing techniques for processing security constraints in a distributed environment during query, update, and database design operations.</p>
Multilevel secure distributed database management system, security constraints, inference problem, security policy, distributed query processing, distributed update processing, multilevel distributed database design.
Bhavani Thuraisingham, William Ford, "Security Constraint Processing in a Multilevel Secure Distributed Database Management System", IEEE Transactions on Knowledge & Data Engineering, vol. 7, no. , pp. 274-293, April 1995, doi:10.1109/69.382297
49 ms
(Ver 3.3 (11022016))