Security model consistency in secure object-oriented systems

T. F. Keefe, W. T. Tsai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Three techniques for evaluating the logical consistency of an object-oriented database security model are examined. The first technique consists of judging the model with respect to a set of general consistency properties for database security models. The second technique compares the SODA (secure object-oriented database) model against two other database security models. The third technique consists of defining a set of entities and mechanisms fundamental to the object-oriented model and considering the effect of the security model on them. Each of these techniques is applied to the SODA security model and is evaluated with respect to applicability, difficulty, and usefulness. Using the results of this analysis, the consistency of the SODA security model is characterized.

Original languageEnglish (US)
Title of host publicationAnnual Computer Security Applications Conference
Editors Anon
Place of PublicationPiscataway, NJ, United States
PublisherPubl by IEEE
Pages290-298
Number of pages9
ISBN (Print)0818620064
StatePublished - 1989
Externally publishedYes
EventFifth Annual Computer Security Applications Conference - Tucson, AZ, USA
Duration: Dec 4 1989Dec 8 1989

Other

OtherFifth Annual Computer Security Applications Conference
CityTucson, AZ, USA
Period12/4/8912/8/89

Fingerprint

Object-oriented databases

ASJC Scopus subject areas

  • Software
  • Engineering(all)

Cite this

Keefe, T. F., & Tsai, W. T. (1989). Security model consistency in secure object-oriented systems. In Anon (Ed.), Annual Computer Security Applications Conference (pp. 290-298). Piscataway, NJ, United States: Publ by IEEE.

Security model consistency in secure object-oriented systems. / Keefe, T. F.; Tsai, W. T.

Annual Computer Security Applications Conference. ed. / Anon. Piscataway, NJ, United States : Publ by IEEE, 1989. p. 290-298.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Keefe, TF & Tsai, WT 1989, Security model consistency in secure object-oriented systems. in Anon (ed.), Annual Computer Security Applications Conference. Publ by IEEE, Piscataway, NJ, United States, pp. 290-298, Fifth Annual Computer Security Applications Conference, Tucson, AZ, USA, 12/4/89.
Keefe TF, Tsai WT. Security model consistency in secure object-oriented systems. In Anon, editor, Annual Computer Security Applications Conference. Piscataway, NJ, United States: Publ by IEEE. 1989. p. 290-298
Keefe, T. F. ; Tsai, W. T. / Security model consistency in secure object-oriented systems. Annual Computer Security Applications Conference. editor / Anon. Piscataway, NJ, United States : Publ by IEEE, 1989. pp. 290-298
@inproceedings{4618b90ca5794b68af864aedc842b8d2,
title = "Security model consistency in secure object-oriented systems",
abstract = "Three techniques for evaluating the logical consistency of an object-oriented database security model are examined. The first technique consists of judging the model with respect to a set of general consistency properties for database security models. The second technique compares the SODA (secure object-oriented database) model against two other database security models. The third technique consists of defining a set of entities and mechanisms fundamental to the object-oriented model and considering the effect of the security model on them. Each of these techniques is applied to the SODA security model and is evaluated with respect to applicability, difficulty, and usefulness. Using the results of this analysis, the consistency of the SODA security model is characterized.",
author = "Keefe, {T. F.} and Tsai, {W. T.}",
year = "1989",
language = "English (US)",
isbn = "0818620064",
pages = "290--298",
editor = "Anon",
booktitle = "Annual Computer Security Applications Conference",
publisher = "Publ by IEEE",

}

TY - GEN

T1 - Security model consistency in secure object-oriented systems

AU - Keefe, T. F.

AU - Tsai, W. T.

PY - 1989

Y1 - 1989

N2 - Three techniques for evaluating the logical consistency of an object-oriented database security model are examined. The first technique consists of judging the model with respect to a set of general consistency properties for database security models. The second technique compares the SODA (secure object-oriented database) model against two other database security models. The third technique consists of defining a set of entities and mechanisms fundamental to the object-oriented model and considering the effect of the security model on them. Each of these techniques is applied to the SODA security model and is evaluated with respect to applicability, difficulty, and usefulness. Using the results of this analysis, the consistency of the SODA security model is characterized.

AB - Three techniques for evaluating the logical consistency of an object-oriented database security model are examined. The first technique consists of judging the model with respect to a set of general consistency properties for database security models. The second technique compares the SODA (secure object-oriented database) model against two other database security models. The third technique consists of defining a set of entities and mechanisms fundamental to the object-oriented model and considering the effect of the security model on them. Each of these techniques is applied to the SODA security model and is evaluated with respect to applicability, difficulty, and usefulness. Using the results of this analysis, the consistency of the SODA security model is characterized.

UR - http://www.scopus.com/inward/record.url?scp=0024911725&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0024911725&partnerID=8YFLogxK

M3 - Conference contribution

SN - 0818620064

SP - 290

EP - 298

BT - Annual Computer Security Applications Conference

A2 - Anon, null

PB - Publ by IEEE

CY - Piscataway, NJ, United States

ER -