TY - JOUR
T1 - Secure query-processing strategies
AU - Keefe, T. F.
AU - Thuraisingham, M. Bhavani
AU - Tsai, W. T.
PY - 1989/3
Y1 - 1989/3
N2 - Strategies for secure query processing in multilevel-security database management systems are proposed that are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants - adding environmental information and using graphs - are described. The performance of the strategies is examined.
AB - Strategies for secure query processing in multilevel-security database management systems are proposed that are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants - adding environmental information and using graphs - are described. The performance of the strategies is examined.
UR - http://www.scopus.com/inward/record.url?scp=0024627547&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0024627547&partnerID=8YFLogxK
U2 - 10.1109/2.16229
DO - 10.1109/2.16229
M3 - Article
AN - SCOPUS:0024627547
SN - 0018-9162
VL - 22
SP - 63
EP - 70
JO - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering
JF - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering
IS - 3
ER -