首页 | 本学科首页   官方微博 | 高级检索  
     


Secure query-processing strategies
Authors:Keefe   T.F. Thuraisingham   M.B. Tsai   W.T.
Affiliation:Dept. of Comput. Sci., Minnesota Univ., Minneapolis, MN;
Abstract:Strategies for secure query processing multilevel-security database management systems are proposed. They are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants-adding environmental information and using graphs-are described. The performance of the strategies is examined
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号