Title :
Computer architectures, database security, and an evaluation metric
Author :
Ronda R. Henning;Brian S. Hubbard;Swen A. Walker
Author_Institution :
National Computer Security Center, Office of Research and Development, C3, 9800 Savage Road, Fort George G. Meade, MD 20755-6000, United States
Abstract :
There are various computer architectures that will support database management applications. The distinction between the security concerns of a database management system and an operating system are not well defined. Both can provide same data security to user applications. The question is how to divide the security controls between the two. This paper details the fundamental security requirements for a database management system, and the operating system security features that a database management system could take advantage of to enhance its own security. A metric for quantifying the security functions of an operating system, the Department of Defense Trusted Computer Systems Evaluation Criteria, is discussed, as is its potential application to database security assessment.
Keywords :
"Operating systems","Access control","Database machines","Dictionaries","Distributed databases"
Conference_Titel :
Data Engineering, 1987 IEEE Third International Conference on
Print_ISBN :
978-0-8186-0762-2
DOI :
10.1109/ICDE.1987.7272419