Using formal security models in secure databases
Fìz.-mat. model. ìnf. tehnol. 2021, 32:70-74
Abstract
The paper contains key provisions (requirements) that should be followed when building secure databases using the capabilities of the main formal access control models, such as discretionary access control models, mandatory access control models, role-based access control models. At the same time, it is noted that any security model does not provide protection but only provides the principle of building a secure database, the implementation of which should ensure the security properties inherent in the model. The security of the database is equally determined by: the properties of the model itself (one or more), its (their) adequacy to the threats affecting the system, and how it (they) is correctly implemented(s). The decisive factor in making a decision is always an assessment of a specific situation, which will allow you to make the right choice, including the complex use of formal models.
References- Harrison, M. A., Ruzzo, W. L., Ullman, J. D. (1976). Protection in Operating Systems. Communications of the ACM, 19(8), 461–471.
DOI doi.org/10.1145/360303.360333 - Lipton, R. J., Snyder, L. (1977). A linear time algorithm for deciding subject security. Journal of the ACM (JACM), 24(3), 455-464.
DOI doi.org/10.1145/322017.322025 - Weissman, C. 1969. Security controls in the ADEPT-50 time-sharing system. Proceedings of the November 18-20, 1969, fall joint computer conference.
DOI doi.org/10.1145/1478559.1478574 - Garcia-Molina, H., Ullman, J. D., Widom, J. (2009). Database Systems. The Complete Book, 2th ed. – Pearson Prentice Hall.
- Bell, D. E., LaPadula, L. J. (1976). Secure Computer Systems: Unified Exposition and Multics Interpretation (MTR-2997 Rev. 1). – Bedford, Mass.: MITRE Corp.
DOI doi.org/10.21236/ada023588 - McLean J. (1990). The specification and modeling of computer security. Computer, 23(1), 9-16.
- Miller, R. L. (2018). Patent 8.478,713 B2. United States: Row-level security in a relational database management system. Curt Cotner, Gilroy, CA (US); , San Jose, CA (US); International Business Machines Corporation, Armonk, NY (US). – N 15/343,568.
- Oracle Database 19c. Administrator's Guide. Understanding Data Labels and User Labels. URL: https://docs.oracle.com/en/database/oracle/oracle-database/19/olsag/understanding-data-labels-and-user-labels.html#GUID-2C0383D3-4AA5-4263-B938-827E2CCC40C0.
DOI doi.org/10.1007/978-1-4842-4321-3_14 - Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E. (1996). Role-based access control models. IEEE Computer, 2, 38-47.
DOI doi.org/10.1109/2.485845
Copyright (c) 2021 Vladislav Vilihura, Yuriy Gorbenko, Vitaliy Yesin, Serhiy Rassomakhin (Автор)

This work is licensed under a Creative Commons Attribution 4.0 International License.