DocumentCode :
912130
Title :
Secure query-processing strategies
Author :
Keefe, T.F. ; Thuraisingham, M.B. ; Tsai, W.T.
Author_Institution :
Dept. of Comput. Sci., Minnesota Univ., Minneapolis, MN, USA
Volume :
22
Issue :
3
fYear :
1989
fDate :
3/1/1989 12:00:00 AM
Firstpage :
63
Lastpage :
70
Abstract :
Strategies for secure query processing multilevel-security database management systems are proposed. They are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants-adding environmental information and using graphs-are described. The performance of the strategies is examined.<>
Keywords :
database management systems; information retrieval; security of data; base relations; definitions; environmental information; graphs; integrity constraints; names; performance; query modification; secure query processing multilevel-security database management systems; view mechanisms; Access control; Authorization; Data security; Database systems; Deductive databases; Multilevel systems; Performance evaluation; Proposals; Query processing; Relational databases;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/2.16229
Filename :
16229
Link To Document :
بازگشت