A protection model for distributed data base management systems

dc.contributor.authorLaribi, Atikaen
dc.contributor.committeechairKafura, Dennis G.en
dc.contributor.committeememberHartson, H. Rexen
dc.contributor.committeememberFox, Edward A.en
dc.contributor.committeememberHacks, James O.en
dc.contributor.committeememberArmstrong, James R.en
dc.contributor.departmentComputer Scienceen
dc.date.accessioned2015-06-29T22:07:02Zen
dc.date.available2015-06-29T22:07:02Zen
dc.date.issued1985en
dc.description.abstractSecurity is important for Centralized Data Base Management Systems (CDBMS) and becomes crucial for Distributed Data Base Management Systems (DDBMS) when different organizations share information. Secure cooperation can be achieved only if each participating organization is assured that the data it makes available will not be abused by other users. In this work differences between CDBMS and DDBMS that characterize the nature of the protection problem in DDBMS are identified. These differences are translated into basic protection requirements. Policies that a distributed data base management protection system should allow are described. The system proposed in this work is powerful enough to satisfy the stated requirements and allow for variations on the policies. This system is a hybrid one where both authorizations and constraints can be defined. The system is termed hybrid because it combines features of both open and closed protection systems. In addition the hybrid system, although designed to offer the flexibility of discretionary systems, incorporates the flow control of information between users, a feature found only in some nondiscretionary systems. Furthermore, the proposed system is said to be integrated because authorizations and constraints can be defined on any of the data bases supported by the system including the data bases containing the authorizations, and the constraints themselves. The hybrid system is incorporated in a general model of DDBMS protection. A modular approach is taken for the design of the model. This approach allows us to represent the different options for the model depending on the set of policy choices taken. Three levels of abstraction describing different aspects of DDBMS protection problems are defined. The conceptual level describes the protection control of the DDBMS transactions and information flows. The logical level is concerned with the interaction between the different organizations participating in the DDBMS. The physical level is involved with the architectural implementation of the logical level.en
dc.description.degreePh. D.en
dc.format.extentix, 258 leavesen
dc.format.mimetypeapplication/pdfen
dc.identifier.urihttp://hdl.handle.net/10919/53883en
dc.language.isoen_USen
dc.publisherVirginia Polytechnic Institute and State Universityen
dc.relation.isformatofOCLC# 12888907en
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subject.lccLD5655.V856 1985.L374en
dc.subject.lcshElectronic data processing -- Distributed processingen
dc.subject.lcshDatabase managementen
dc.subject.lcshData protectionen
dc.titleA protection model for distributed data base management systemsen
dc.typeDissertationen
dc.type.dcmitypeTexten
thesis.degree.disciplineComputer Scienceen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.leveldoctoralen
thesis.degree.namePh. D.en

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
LD5655.V856_1985.L374.pdf
Size:
9.24 MB
Format:
Adobe Portable Document Format