首页 | 本学科首页   官方微博 | 高级检索  
     


Designing secure databases
Affiliation:1. School of Computer and Information Technology, Xinyang Normal University, 237, Nanhu Rd, Henan Xinyang 464000, China;2. School of Computer and Electronics Information, Guangxi University, Nanning 530004, China;3. School of Information Science and Engineering, Central South University, Changsha 410083, China;4. School of Information Technology, Deakin University, Australia;5. College of Computer Science, Huaqiao University, Fujian Quanzhou 362000, China;1. Department of Computer Science & Engineering, IIT Roorkee, India;2. Department of Computing, The Hong Kong Polytechnic University, Kowloon, Hong Kong;3. Department of Computer Science, Sun Yat-sen University, Guangzhou, 510275, China;1. Department of Oncology, University Hospital, Udine, Italy;2. Department of Medical Oncology, National Cancer Institute “G. Paolo II”, Bari, Italy;3. Department of Medical Oncology, Antonio Perrino Hospital, Brindisi, Italy;1. Department of Experimental Psychology, Ghent University, Belgium;2. Department of Cognitive Neuropsychology, Tilburg University, The Netherlands
Abstract:Security is an important issue that must be considered as a fundamental requirement in information systems development, and particularly in database design. Therefore security, as a further quality property of software, must be tackled at all stages of the development. The most extended secure database model is the multilevel model, which permits the classification of information according to its confidentiality, and considers mandatory access control. Nevertheless, the problem is that no database design methodologies that consider security (and therefore secure database models) across the entire life cycle, particularly at the earliest stages currently exist. Therefore it is not possible to design secure databases appropriately. Our aim is to solve this problem by proposing a methodology for the design of secure databases. In addition to this methodology, we have defined some models that allow us to include security information in the database model, and a constraint language to define security constraints. As a result, we can specify a fine-grained classification of the information, defining with a high degree of accuracy which properties each user has to own in order to be able to access each piece of information. The methodology consists of four stages: requirements gathering; database analysis; multilevel relational logical design; and specific logical design. The first three stages define activities to analyze and design a secure database, thus producing a general secure database model. The last stage is made up of activities that adapt the general secure data model to one of the most popular secure database management systems: Oracle9i Label Security. This methodology has been used in a genuine case by the Data Processing Center of Provincial Government. In order to support the methodology, we have implemented an extension of Rational Rose, including and managing security information and constraints in the first stages of the methodology.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号