Secure query-processing strategies

T. F. Keefe, M. Bhavani Thuraisingham, W. T. Tsai

Research output: Contribution to journalArticle

24 Citations (Scopus)

Abstract

Strategies for secure query processing in multilevel-security database management systems are proposed that are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants - adding environmental information and using graphs - are described. The performance of the strategies is examined.

Original languageEnglish (US)
Pages (from-to)63-70
Number of pages8
JournalComputer
Volume22
Issue number3
DOIs
StatePublished - Mar 1989
Externally publishedYes

Fingerprint

Query processing

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Hardware and Architecture
  • Software

Cite this

Keefe, T. F., Thuraisingham, M. B., & Tsai, W. T. (1989). Secure query-processing strategies. Computer, 22(3), 63-70. https://doi.org/10.1109/2.16229

Secure query-processing strategies. / Keefe, T. F.; Thuraisingham, M. Bhavani; Tsai, W. T.

In: Computer, Vol. 22, No. 3, 03.1989, p. 63-70.

Research output: Contribution to journalArticle

Keefe, TF, Thuraisingham, MB & Tsai, WT 1989, 'Secure query-processing strategies', Computer, vol. 22, no. 3, pp. 63-70. https://doi.org/10.1109/2.16229
Keefe TF, Thuraisingham MB, Tsai WT. Secure query-processing strategies. Computer. 1989 Mar;22(3):63-70. https://doi.org/10.1109/2.16229
Keefe, T. F. ; Thuraisingham, M. Bhavani ; Tsai, W. T. / Secure query-processing strategies. In: Computer. 1989 ; Vol. 22, No. 3. pp. 63-70.
@article{b024836ba8994cdca39caf265447ada6,
title = "Secure query-processing strategies",
abstract = "Strategies for secure query processing in multilevel-security database management systems are proposed that are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants - adding environmental information and using graphs - are described. The performance of the strategies is examined.",
author = "Keefe, {T. F.} and Thuraisingham, {M. Bhavani} and Tsai, {W. T.}",
year = "1989",
month = "3",
doi = "10.1109/2.16229",
language = "English (US)",
volume = "22",
pages = "63--70",
journal = "ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering",
issn = "0018-9162",
publisher = "IEEE Computer Society",
number = "3",

}

TY - JOUR

T1 - Secure query-processing strategies

AU - Keefe, T. F.

AU - Thuraisingham, M. Bhavani

AU - Tsai, W. T.

PY - 1989/3

Y1 - 1989/3

N2 - Strategies for secure query processing in multilevel-security database management systems are proposed that are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants - adding environmental information and using graphs - are described. The performance of the strategies is examined.

AB - Strategies for secure query processing in multilevel-security database management systems are proposed that are carried out by query modification, a technique that has been used for enforcing integrity constraints and providing view mechanisms. The technique consists of replacing the query the user presents with one that, when evaluated, will perform the desired function. In the case of a view mechanism, the names of views referenced in the query are replaced by the definitions of the views in terms of base relations. The basic strategy and two variants - adding environmental information and using graphs - are described. The performance of the strategies is examined.

UR - http://www.scopus.com/inward/record.url?scp=0024627547&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0024627547&partnerID=8YFLogxK

U2 - 10.1109/2.16229

DO - 10.1109/2.16229

M3 - Article

AN - SCOPUS:0024627547

VL - 22

SP - 63

EP - 70

JO - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering

JF - ACM SIGPLAN/SIGSOFT Workshop on Program Analysis for Software Tools and Engineering

SN - 0018-9162

IS - 3

ER -