Modelling data secrecy and integrity

0
91

Authors: A. Min Tjoa, Giinther Pernul, Werner Winiwarter

Tags: 1998, conceptual modeling

The paper describes a semantic data model used as a design environment for multilevel secure database applications. The proposed technique is built around the concept of security classification constraints (security semantics) and takes into account that security restrictions may either have effects on the static part of a system, on the behavior of the system (the system functions), or on both. As security constraints may influence each other appropriate integrity mechanisms are necessary and modelling of a multilevel application must be data as well as function driven. This functionality is included in the proposed semantic data model for multilevel security by developing secure data schemas, secure function schemas, a procedure for alternating iterative refinements on either schema, and a powerful integrity system to check the consistency of the classification constraints and of the multilevel secure database application.

Read the full paper here: https://pdf.sciencedirectassets.com/271546/1-s2.0-S0169023X00X00341/1-s2.0-S0169023X97000451/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEI7%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIDZn8%2Fwm%2B7v%2Be4TV4kMkeXlEYmccnWs5yHXgdbO4ldrPAiEA9n3ARU%2FGiK%2FvrnMvBBgzENG6OX81lcFiWFYgTVviAJoqvQMIp%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARADGgwwNTkwMDM1NDY4NjUiDDKzVTu9S5xPm%2F1tKCqRA41K8cXydX9qhggALZWf%2BO3gbweo3BBIdhuD%2Fqbsv02z0TPUKOFey2QkSD%2BJIEWAXcUVtFwV4CYNvD9quNk8WQiBXRBvBQuCHtzE83ysLCZcSm1%2FNx27Jd%2BupME2vJkRzigozrZsWDggSYupi34dv2V9oweohiR%2FVLx%2FIQ2DvnYMliiGliCUB%2BZ9BeJAiCM%2BbNcymxQIHmY2rqK%2FIgQvWZ7TeQafgCP6kBYndOSj2H5cZLHwNm%2BSvDJHBjsr4kdL0wRsI44x1MIg0w9Q5YyR1dyKuwsCRBtWd6gx9jVEXtIsR8OzyYMfYtjeBej9YBkd1tj4PMUkwKjPxYp29%2Fa262L%2F5knIdxIwxB0udELtGEKx2TJLoWqjzSDVDpokYvWUWjs0wlJnC%2B4%2B%2BAqMizCHgWrOTB%2BAo9dzi44Nwz2e%2B5qN9uGXUd%2Fc4lCoXMvY67QZDePd2UrFcW8uOAw76%2B0DWn10Ucs%2B2fi6L%2Bbra7VWnAXND86xewpGYJd3nIELrlAam4%2FSUZOVOpIURUpq%2BS3aBjNvMLCnrfsFOusBeNEhKaXlWiChNr3tfpAMU42oH0abaBNlQoDLcKYeyRsJAiVydS6pWyKF3yrq5tUnr5OHhB7Ic6NOdYcrr6PJOnNQh1OLVaxBpW%2Fi3VdD9wzNjMPlYRkhdaX6Wh1yB3q0%2FuqmA1PbYRLwS%2FzCt8q1I7wQTWgJSBHZxGrKGCBZaTOI8rRnBRTBqinD4kEvazRYeCXZzrlBRNhpvkPItR4MmqLG47yBmxiaQH3k0mJIc568yAwY2C1wfU6Lz6eHMt2ybuOtr4lEh3aa5hJFpcsf75ygKUVOsdUxgOIoneQJ%2FHtgFXbKkOWOIyQPgA%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200923T150422Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTYVNEOGOOM%2F20200923%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=08fea8b984bb34b2701caa9cc61a879e602cf8403fe8a40788d61a79e2fc52e3&hash=8b1407af5d115fb3ff215e50db1fbf0616c16e6d6be176849585ea79753bae7b&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S0169023X97000451&tid=spdf-94186fdd-86d2-45e6-a252-99bbe003d6a8&sid=1f5c30f079ceb643ef78a73-06e4b573fde2gxrqa&type=client