Abstract
On May 24–26, 1988, about 25 researchers working on multilevel security for database systems met at Vallombrosa Conference and Retreat Center in Menlo Park, California. The workshop was organized and led by Teresa Lunt of SRI International and was sponsored by the U.S. Air Force, Rome Air Development Center (RADC). The workshop’s focus was on multilevel security for database systems. It was the first extended technical interchange among those participating in the following projects, most of which were inspired by the 1982 Air Force Summer Study [AFSS83]: SRI’s and Gemini Computer’s SeaView A1 multilevel relational database system [LSS+88]; TRW’s A1 Secure Prototype DBMS [Gar88]; the Unisys B3 secure database system project; Honeywell’s LOCK Data Views (LDV) project [DOST88]; MITRE’s Kernelized Trusted DBMS project; the Naval Research Laboratory’s Secure Military Message System [LHM84]; AOG Systems’ secure entity-relationship (E/R) project [CI88]; MITRE’s Integrity Lock project [Gra84]; and the Hinke-Schaefer secure database project [HS75].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M.M. Astrahan et al. System R: A relational database management system. Computer, 12(5), 1979.
Committee on Multilevel Data Management Security Air Force Summer Study. Multilevel data management security. Technical report, Air Force Studies Board, National Research Council, National Academy Press, 1983. For Official Use Only.
National Computer Security Center. Department of defense trusted computer system evaluation criteria. Technical Report DOD 5200.28-STD, Department of Defense, December 1985.
National Computer Security Center. National computer security center trusted network interpretation. Technical Report NCSC-TG-005, Version 1, Department of Defense, July 1987.
AOG Systems Corporation and Gemini Systems Inc. Multilevel secure entity-relationship DBMS. Draft, AOG Systems Corporation, May 19 1988.
P.A. Dwyer, E. Onuegbe, P. Stachour, and B.M. Thuraisingham. Secure distributed data views—implementation specification for a dbms. Interim report a005, Honeywell Systems Research Center and Corporate Systems Development Division, May 1988.
C. Garvey. ASD views. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
R.D. Graubart. The integrity-lock approach to secure database management. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, 1984.
T.H. Hinke and M. Schaefer. Secure data management system. Technical Report RADC-TR-75-266, System Development Corporation, November 1975.
T.F. Lunt and T.A. Berson. An expert system to classify and sanitize text. In Proceedings of the Third Aerospace Computer Security Conference, December 1987.
T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, and W.R. Shockley. Element-level classification with A1 assurance. Computers and Security, February 1988.
C.E. Landwehr, C.L. Heitmeyer, and J. McLean. A security model for military message systems. ACM Transactions on Computer Systems, 2(3), August 1984.
T.F. Lunt, R.R. Schell, W.R. Shockley, M. Heckman, and D. Warren. A near-term design for the SeaView multilevel database system. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
T.F. Lunt. Access control policies for database systems. In Proceedings of the 2nd IFIP WG11.3 Workshop on Database Security, October 1988.
T.F. Lunt. Multilevel database systems: Meeting class A1. In Proceedings of the 2nd IFIP WG11.3 Workshop on Database Security, October 1988.
M. Morgenstern. Controlling logical inference in multilevel database systems. In Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988.
NCSC, editor. Proceedings of the National Computer Security Center Invitational Workshop on Database Security. Baltimore, Maryland, June 1986.
M. Schaefer and R.R. Schell. Toward an understanding of extensible architectures for evaluated trusted computer system products. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, April 1984.
W.R. Shockley and R.R. Schell. TCB subsetting for incremental evaluation. In Proceedings of the Third AIAA Conference on Computer Security, December 1987.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
Lunt, T.F. (1992). Workshop Summary. In: Lunt, T.F. (eds) Research Directions in Database Security. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2870-7_1
Download citation
DOI: https://doi.org/10.1007/978-1-4612-2870-7_1
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97736-2
Online ISBN: 978-1-4612-2870-7
eBook Packages: Springer Book Archive