1983 IEEE Symposium on Security and Privacy 1983
DOI: 10.1109/sp.1983.10009
|View full text |Cite
|
Sign up to set email alerts
|

Using Views in a Multilevel Secure Database Management System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

1986
1986
2009
2009

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…They allow users to manage data presentation without affecting underlying data. Views are also used to enhance database security [58,59]. We exploit and enhance views so as to provide users with lightweight methods for adjusting presentation of personal data and managing information flows.…”
Section: Boundaries As Two-way Permeable Views In Contextmentioning
confidence: 99%
“…They allow users to manage data presentation without affecting underlying data. Views are also used to enhance database security [58,59]. We exploit and enhance views so as to provide users with lightweight methods for adjusting presentation of personal data and managing information flows.…”
Section: Boundaries As Two-way Permeable Views In Contextmentioning
confidence: 99%
“…Neither the IBM nor SRI projects addressed the issues that would be raised if'views were used to classify data and enforce mandatory security. Proposals to use secure views as a basis for multilevel-secure database systems were independently made by Claybrook [9] and by Denning [10], who at that time was helping to organize the 1982 Woods Hole Summer Study on Multilevel Database Management Security sponsored by the National Academy of Sciences, Air Force Studies Board. Denning observed that because views can define arbitrary sets of stored and derived data, they could provide a means of addressing the problems of context-and content-dependent classification, inference, aggregation, and sanitization on a dynamic database.…”
Section: Introductionmentioning
confidence: 99%
“…Proposals to use secure views as a basis for multilevel-secure database systems were independently made by Claybrook [9] and by Denning [10], who at that time was helping to organize the 1982 Woods Hole Summer Study on Multilevel Database Management Security sponsored by the National Academy of Sciences, Air Force Studies Board. Denning observed that because views can define arbitrary sets of stored and derived data, they could provide a means of addressing the problems of context-and content-dependent classification, inference, aggregation, and sanitization on a dynamic database.…”
mentioning
confidence: 99%