Secure query-processing strategies
- 1 March 1989
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Computer
- Vol. 22 (3) , 63-70
- https://doi.org/10.1109/2.16229
Abstract
Strategies for secure query processing multilevel-security database management systems are proposed. They are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants-adding environmental information and using graphs-are described. The performance of the strategies is examined.Keywords
This publication has 8 references indexed in Scilit:
- Controlling logical inference in multilevel database systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Inference aggregation detection in database management systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A Theorem-Proving Approach to Database IntegrityPublished by Elsevier ,1988
- Security checking in relational database management systems augmented with inference enginesComputers & Security, 1987
- Multi-level security in database management systemsComputers & Security, 1987
- Data Dependencies and Inference Control in Multilevel Relational Database SystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Knowledge Base RetrievalPublished by Springer Nature ,1986
- DEDUCE 2: Further Investigations of Deduction in Relational Data BasesPublished by Springer Nature ,1978