{"title":"使用任意和强制安全方法的高度安全的面向对象数据模型","authors":"Eric Minor, Susan V. Vrbsky","doi":"10.1145/2817460.2817515","DOIUrl":null,"url":null,"abstract":"Today's industries, such as the intelligence industry, the medical industry, and the government, rely strongly on object-oriented database systems to protect their highly sensitive data from being infiltrated and/or corrupted by malicious users. Therefore, the need for a reliable database security paradigm has become an immediate concern. Current security methods such as the discretionary method, and the mandatory method address this concern. Although both methods provide significant progresses in database security for object-oriented databases, there still exists a gap between current security measures and a completely secure database system. Our goal in this paper is to narrow this gap by presenting a security data model that combines both the discretionary policies and the mandatory policies as well as establish its own security policies.","PeriodicalId":274966,"journal":{"name":"ACM-SE 35","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1997-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A tightly secure object-oriented data model using both discretionary and mandatory security methodologies\",\"authors\":\"Eric Minor, Susan V. Vrbsky\",\"doi\":\"10.1145/2817460.2817515\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today's industries, such as the intelligence industry, the medical industry, and the government, rely strongly on object-oriented database systems to protect their highly sensitive data from being infiltrated and/or corrupted by malicious users. Therefore, the need for a reliable database security paradigm has become an immediate concern. Current security methods such as the discretionary method, and the mandatory method address this concern. Although both methods provide significant progresses in database security for object-oriented databases, there still exists a gap between current security measures and a completely secure database system. Our goal in this paper is to narrow this gap by presenting a security data model that combines both the discretionary policies and the mandatory policies as well as establish its own security policies.\",\"PeriodicalId\":274966,\"journal\":{\"name\":\"ACM-SE 35\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1997-04-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM-SE 35\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2817460.2817515\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM-SE 35","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2817460.2817515","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A tightly secure object-oriented data model using both discretionary and mandatory security methodologies
Today's industries, such as the intelligence industry, the medical industry, and the government, rely strongly on object-oriented database systems to protect their highly sensitive data from being infiltrated and/or corrupted by malicious users. Therefore, the need for a reliable database security paradigm has become an immediate concern. Current security methods such as the discretionary method, and the mandatory method address this concern. Although both methods provide significant progresses in database security for object-oriented databases, there still exists a gap between current security measures and a completely secure database system. Our goal in this paper is to narrow this gap by presenting a security data model that combines both the discretionary policies and the mandatory policies as well as establish its own security policies.