Proceedings 2004 VLDB Conference 2004
DOI: 10.1016/b978-012088469-8/50088-7
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems

Abstract: Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challenging problems to the database research community, and there has been an abundance of research work to address those problems. Unfortunately, the use of MLS RDBMS has been restricted to a few government organizations where MLS is of paramount importance such as the intelligence community and the Department of Defense. The implication … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2007
2007
2012
2012

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 8 publications
0
12
0
Order By: Relevance
“…It indicates that the larger the category for an object is, the fewer the users that can access it. In some applications [18,21], the rule for label comparison is not as rigorous as this. On the contrary, the requirement is: the larger the category for an object is, the more the users that can access it.…”
Section: Strict *-Property: a Subject S Can Write An Object O Only Ifmentioning
confidence: 99%
“…It indicates that the larger the category for an object is, the fewer the users that can access it. In some applications [18,21], the rule for label comparison is not as rigorous as this. On the contrary, the requirement is: the larger the category for an object is, the more the users that can access it.…”
Section: Strict *-Property: a Subject S Can Write An Object O Only Ifmentioning
confidence: 99%
“…The larger the set of category for an object is, the fewer the users that can access it. In some applications [7,8], the rule for label comparing is not as rigorous as this. On the contrary, the requirement is: the larger the set of category, the more users that can access it.…”
Section: L(s) If and Only If L(o)l ≤ L(s)l And L(o)c ⊆ L(s)c We mentioning
confidence: 99%
“…Moreover, in these applications the structure of the label may be different from the structure of the label in the BLP model. In order to meet the needs of these applications, [5,7,8] have enhanced the flexibility of the MAC mechanism in relational databases. The existing MAC models [4,6] for XML databases are all based on the BLP model.…”
Section: L(s) If and Only If L(o)l ≤ L(s)l And L(o)c ⊆ L(s)c We mentioning
confidence: 99%
“…Instead of attaching access control information directly to the data (as DAC does), in MAC system-wide security policies are enforced on the basis of security models (see, e. g., [24]). (Relational) databases implementing MAC are also called "multilevel secure" (MLS) and make use of techniques like polyinstantiation; see, e. g., [22,21,14,23,18]. Moreover, e. g. in [22,2,13], comprehensive systems have been proposed that integrate DAC and/or MAC into the different stages of database design.…”
Section: Related Workmentioning
confidence: 99%