Abstract
This paper introduces guidelines to prevent illegal information flows due to object deletion in multilevel secure object database management systems (ODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.
Chapter PDF
Similar content being viewed by others
References
Bell, D. and LaPadula, L. (1975) Secure computer systems: unified exposition and multics interpretation. TR ESD-TR-75–306, MTR-2997, MITRE.
Bertino, E. and Ferrari, E. (1997a) A Principled Approach to Object Deletion and Garbage Collection in Multilevel Secure Object Bases. Pre-Proceedings of the 11th Annual IFIP WG 11.3 Working Conf. on Database Security, pages 75–86, Lake Tahoe, CA.
Bertino E., Ferrari, E. and Samarati, P. (1997b) A multilevel entity model and its mapping onto a single-level object model. Theory and Practice of Object Systems, to appear.
Bertino, E. Mancini, L. V. and Jajodia, S. (1994) Collecting garbage in multilevel secure object stores. In Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA.
Chokhani, S. (1992) Trusted products evaluation. Communications of the ACM, 35 (7): 66–76.
Deux, O. et al. (1990) The story of 02. IEEE Trans. on Knowledge and Data Engineering, 2 (1): 91–108.
Fishman, D. et al. (1989) Overwiew of the Iris DBMS. Object-oriented concepts, databases, and applications. Addison-Wesley,pages. 219–50.
Kim, W. et al. (1990) Architecture of the ORION next-generation database system. IEEE Trans. on Knowledge and Data Engineering, 2 (1): 109–24.
Kolodner, E., Liskov B. and Weihl, W. (1989) Atomic garbage collection: managing a stable heap. In Proc. ACM-SIGMOD Conf..
Jajodia, S. and Atluri, V. (1992) Alternative correctness criteria for concurrent executions of transactions in multilevel secure database systems. In Proc. of the IEEE Symp. on Research in Security and Privacy, Oakland, CA.
Jajodia, S. and Kogan, B. (1990) Integrating an object-oriented data model with multilevel security. In Proc. of the IEEE Symp. on Research in Security and Privacy, Oakland, CA.
Maier, D. et al. (1986) Development of an object-oriented DBMS. In Proc. of the 1st OOPSLA Conference, Portland, Oregon.
Millen, J. K. and Lunt, T. F. (1992) Security for object-oriented database systems. In Proc. of the IEEE Symp. on Research in Security and Privacy Oakland, CA.
Moss, J. E. (1992) Working with persistent objects: to swizzle or not to swizzle. IEEE Trans. on Software Engineering, 18 (8).
Rabitti, F. Bertino, E. Kim, W. and Woelk, D. A model of authorization for object-oriented and semantic database systems. A CM Trans. on Database Systems, 16(1).
Shockley, W. R. and Schell, R. R. (1987) TCB subsets for incremental evaluation. In Proc. of the 2nd AIAA Conference on Computer Security.
Thuraisingham, M.B. (1989) Mandatory security in object-oriented database systems. In Proc. of the OOPSLA Conference, New Orleans, Louisiana
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 IFIP
About this chapter
Cite this chapter
Bertino, E., Ferrari, E. (1998). A principled approach to object deletion and garbage collection in multilevel secure object bases. In: Lin, T.Y., Qian, S. (eds) Database Security XI. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35285-5_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-35285-5_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2914-5
Online ISBN: 978-0-387-35285-5
eBook Packages: Springer Book Archive