Title :
Providing security in a phone book database using triggers
Author :
Lewis, Sharon R. ; Wiseman, Simon R. ; Poulter, Neil D.
Author_Institution :
Defence Res. Agency, Malvern, UK
fDate :
30 Nov-4 Dec 1992
Abstract :
It is proposed that all database security controls except those which provide information flow security can be built using a suitable trigger mechanism. The implementation of an example application, which has a variety of requirements for confidentially, integrity and accountability, is shown to illustrate the technique. The trigger mechanism is to be implemented using query modification as part of the SWORD secure database management system project
Keywords :
authorisation; database management systems; query processing; SWORD secure database management system; accountability; confidentially; database security controls; information flow security; integrity; phone book database; query modification; triggers; Access control; Aggregates; Application software; Books; Computer security; Data security; Information security; National security; Relational databases; Telephony;
Conference_Titel :
Computer Security Applications Conference, 1992. Proceedings., Eighth Annual
Conference_Location :
San Antonio, TX
Print_ISBN :
0-8186-3115-5
DOI :
10.1109/CSAC.1992.228230