Specification and enforcement of classification and inference constraints

被引:14
|
作者
Dawson, S [1 ]
di Vimercati, SD [1 ]
Samarati, P [1 ]
机构
[1] SRI Int, Comp Sci Lab, Menlo Pk, CA 94025 USA
关键词
D O I
10.1109/SECPRI.1999.766913
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Although mandatory access control in database systems has been extensively studied in recent years, and several models and systems have been proposed, capabilities for enforcement of mandatory constraints remain limited. Lack of support for expressing and combating inference channels that improperly leak protected information remains a major limitation in today's multilevel systems. Moreover the working assumption that data are classified at insertion time makes previous approaches inapplicable to the classification of existing, possibly historical, data repositories that need to be classified for release. Such a capability would be of great benefit to, and appears to be in demand by, governmental, public, and private institutions. We address the problem of classifying existing data repositories by taking into consideration explicit data classification as well as association and inference constraints. Constraints are expressed in a unified DBMS- and model-independent framework, making the approach largely applicable. We introduce the concept of minimal classification as a labeling of data elements that, while satisfying the constraints, ensures that no data element is classified at a level higher than necessary. We also describe a technique and present an algorithm for generating data classifications that are both minimal and preferred according to certain criteria. Our approach is based on preprocessing, or compiling, constraints to produce a set of simple classification assignments that can then be efficiently applied to classify any database instance.
引用
收藏
页码:181 / 195
页数:15
相关论文
共 50 条
  • [1] Authorization Constraints Specification and Enforcement
    Zhou, Wei
    Meinel, Christoph
    Xiang, Yidong
    Shao, Yang
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 38 - 50
  • [2] Flow policies: Specification and enforcement
    Bertino, E
    Ferrari, E
    Mella, G
    [J]. CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 681 - 686
  • [3] Deterministic enforcement of constraints
    Laurent, D
    Spyratos, N
    Stamate, D
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 1998, 24 (02) : 71 - 83
  • [4] Specification and runtime enforcement of security policies
    Jin, Ying
    Zhang, Jing
    Zheng, Xiaojuan
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 244 - +
  • [5] Using RDF for policy specification and enforcement
    Carminati, B
    Ferrari, E
    Thuraisingham, B
    [J]. 15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 163 - 167
  • [6] The specification and enforcement of advanced security policies
    Ryutov, T
    Neuman, C
    [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 128 - 138
  • [7] Estimation, inference and specification analysis
    Steerneman, T
    [J]. ECONOMIST, 1999, 147 (01): : 115 - 117
  • [8] Distributed enforcement of integrity constraints
    Dahav, B
    Etzion, O
    [J]. DISTRIBUTED AND PARALLEL DATABASES, 2003, 13 (03) : 227 - 249
  • [9] Distributed Enforcement of Integrity Constraints
    Boris Dahav
    Opher Etzion
    [J]. Distributed and Parallel Databases, 2003, 13 : 227 - 249
  • [10] Qualitative constraint enforcement in advanced policy specification
    Mileo, Alessandra
    Schaub, Torsten
    [J]. SYMBOLIC AND QUANTITATIVE APPROACHES TO REASONING WITH UNCERTAINTY, PROCEEDINGS, 2007, 4724 : 695 - +