{"title":"Comparative study of polyinstantiation models in MLS database","authors":"A. Sallam, Sayed M. Elrabie, O. Faragallah","doi":"10.1109/ICENCO.2010.5720444","DOIUrl":null,"url":null,"abstract":"Polyinstantiabtion provides the ability to create more versions of single information. It is used to prevent inference attacks. This paper explains the use of polyinstantiation in relational databases with multilevel security. Also, shows how polyinstantiation can be occurred and what types of polyinstantiation. The basic concepts of multilevel security database models are described and issues regarding the MLS such as semantics, decomposition and recovery algorithms are considered. A comparison of well-known multilevel security models (SeaView, Jajodia-Sandhu, Smith-Winslett, MLR, and Belief-Consistent Model) is given. The main problems such as semantic ambiguity caused by the lack of semantics or incomplete semantic definitions, proliferation problem, Restriction of the scope of an update and disbelief in a tuple are discussed","PeriodicalId":436095,"journal":{"name":"2010 International Computer Engineering Conference (ICENCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Computer Engineering Conference (ICENCO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICENCO.2010.5720444","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Polyinstantiabtion provides the ability to create more versions of single information. It is used to prevent inference attacks. This paper explains the use of polyinstantiation in relational databases with multilevel security. Also, shows how polyinstantiation can be occurred and what types of polyinstantiation. The basic concepts of multilevel security database models are described and issues regarding the MLS such as semantics, decomposition and recovery algorithms are considered. A comparison of well-known multilevel security models (SeaView, Jajodia-Sandhu, Smith-Winslett, MLR, and Belief-Consistent Model) is given. The main problems such as semantic ambiguity caused by the lack of semantics or incomplete semantic definitions, proliferation problem, Restriction of the scope of an update and disbelief in a tuple are discussed