Skip to main content

Abstract

On May 24–26, 1988, about 25 researchers working on multilevel security for database systems met at Vallombrosa Conference and Retreat Center in Menlo Park, California. The workshop was organized and led by Teresa Lunt of SRI International and was sponsored by the U.S. Air Force, Rome Air Development Center (RADC). The workshop’s focus was on multilevel security for database systems. It was the first extended technical interchange among those participating in the following projects, most of which were inspired by the 1982 Air Force Summer Study [AFSS83]: SRI’s and Gemini Computer’s SeaView A1 multilevel relational database system [LSS+88]; TRW’s A1 Secure Prototype DBMS [Gar88]; the Unisys B3 secure database system project; Honeywell’s LOCK Data Views (LDV) project [DOST88]; MITRE’s Kernelized Trusted DBMS project; the Naval Research Laboratory’s Secure Military Message System [LHM84]; AOG Systems’ secure entity-relationship (E/R) project [CI88]; MITRE’s Integrity Lock project [Gra84]; and the Hinke-Schaefer secure database project [HS75].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M.M. Astrahan et al. System R: A relational database management system. Computer, 12(5), 1979.

    Google Scholar 

  2. Committee on Multilevel Data Management Security Air Force Summer Study. Multilevel data management security. Technical report, Air Force Studies Board, National Research Council, National Academy Press, 1983. For Official Use Only.

    Google Scholar 

  3. National Computer Security Center. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, December 1985.

    Google Scholar 

  4. National Computer Security Center. National computer security center trusted network interpretation. Technical Report NCSC-TG-005, Version 1, Department of Defense, July 1987.

    Google Scholar 

  5. AOG Systems Corporation and Gemini Systems Inc. Multilevel secure entity-relationship DBMS. Draft, AOG Systems Corporation, May 19 1988.

    Google Scholar 

  6. P.A. Dwyer, E. Onuegbe, P. Stachour, and B.M. Thuraisingham. Secure distributed data views—implementation specification for a dbms. Interim report a005, Honeywell Systems Research Center and Corporate Systems Development Division, May 1988.

    Google Scholar 

  7. C. Garvey. ASD views. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  8. R.D. Graubart. The integrity-lock approach to secure database management. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, 1984.

    Google Scholar 

  9. T.H. Hinke and M. Schaefer. Secure data management system. Technical Report RADC-TR-75-266, System Development Corporation, November 1975.

    Google Scholar 

  10. T.F. Lunt and T.A. Berson. An expert system to classify and sanitize text. In Proceedings of the Third Aerospace Computer Security Conference, December 1987.

    Google Scholar 

  11. T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, and W.R. Shockley. Element-level classification with A1 assurance. Computers and Security, February 1988.

    Google Scholar 

  12. C.E. Landwehr, C.L. Heitmeyer, and J. McLean. A security model for military message systems. ACM Transactions on Computer Systems, 2(3), August 1984.

    Google Scholar 

  13. T.F. Lunt, R.R. Schell, W.R. Shockley, M. Heckman, and D. Warren. A near-term design for the SeaView multilevel database system. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  14. T.F. Lunt. Access control policies for database systems. In Proceedings of the 2nd IFIP WG11.3 Workshop on Database Security, October 1988.

    Google Scholar 

  15. T.F. Lunt. Multilevel database systems: Meeting class A1. In Proceedings of the 2nd IFIP WG11.3 Workshop on Database Security, October 1988.

    Google Scholar 

  16. M. Morgenstern. Controlling logical inference in multilevel database systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.

    Google Scholar 

  17. NCSC, editor. Proceedings of the National Computer Security Center Invitational Workshop on Database Security. Baltimore, Maryland, June 1986.

    Google Scholar 

  18. M. Schaefer and R.R. Schell. Toward an understanding of extensible architectures for evaluated trusted computer system products. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, April 1984.

    Google Scholar 

  19. W.R. Shockley and R.R. Schell. TCB subsetting for incremental evaluation. In Proceedings of the Third AIAA Conference on Computer Security, December 1987.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag New York, Inc.

About this chapter

Cite this chapter

Lunt, T.F. (1992). Workshop Summary. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-2870-7_1

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-97736-2

  • Online ISBN: 978-1-4612-2870-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics