Encyclopedia of Database Systems

2018 Edition
| Editors: Ling Liu, M. Tamer Özsu

Multilevel Secure Database Management System

  • Bhavani ThuraisinghamEmail author
Reference work entry
DOI: https://doi.org/10.1007/978-1-4614-8265-9_230


Secure database systems; Trusted database systems


Many of the developments in the 1980s and 1990s in database security were on multi-level secure database management systems (MLS/DBMS). These systems were also called trusted database management systems (TDBMS). In a MLS/DBMS, users are cleared at different clearance levels such as Unclassified, Confidential, Secret and TopSecret. Data is assigned different sensitivity levels such as Unclassified, Confidential, Secret, and TopSecret. It is generally assumed that these security levels form a partially ordered lattice. For example, Unclassified < Confidential < Secret < TopSecret. Partial ordering comes from having different compartments. For example, Secret Compartment A may be incomparable to Secret Compartment B.

Historical Background

MLS/DBMSs have evolved from the developments in multilevel secure operating systems such as MULTICS and SCOMP (see for example [4]) and the developments in database systems. Few...

This is a preview of subscription content, log in to check access.

Recommended Reading

  1. 1.
    Campbell J. A year of progress in database security. In: Proceedings of the National Computer SecurityConference; 1990.Google Scholar
  2. 2.
    Committee on Multilevel Data Management Security. Air Force studies board. Multilevel Data Management Security. Washington, DC: National Academy Press; 1983.Google Scholar
  3. 3.
    Hinke T, Schaefer M. Secure data management system. System Development Corp., Technical Report RADC-TR-75-266, Nov 1975.Google Scholar
  4. 4.
    IEEE Computer Magazine, vol. 16, #7; 1983.Google Scholar
  5. 5.
    Thuraisingham B. Database and applications security: integrating data management and information security. Boca Raton: CRC Press; 2005.zbMATHCrossRefGoogle Scholar
  6. 6.
    Thuraisingham B. Recursion theoretic properties of the inference problem. Presented at the IEEE Computer Security Foundations Workshop, Franconia, Jun 1990 (also available as MITRE technical Paper MTP291, Jun 1990).Google Scholar
  7. 7.
    Trusted Computer Systems Evaluation Criteria,National Computer Security Center, MD; 1985.Google Scholar
  8. 8.
    Trusted Database Interpretation. National Computer Security Center, MD; 1991.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.The University of Texas at DallasRichardsonUSA

Section editors and affiliations

  • Elena Ferrari
    • 1
  1. 1.DiSTAUniv. of InsubriaVareseItaly