Security model consistency in secure object-oriented systems

T. F. Keefe, W. T. Tsai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Three techniques for evaluating the logical consistency of an object-oriented database security model are examined. The first technique consists of judging the model with respect to a set of general consistency properties for database security models. The second technique compares the SODA (secure object-oriented database) model against two other database security models. The third technique consists of defining a set of entities and mechanisms fundamental to the object-oriented model and considering the effect of the security model on them. Each of these techniques is applied to the SODA security model and is evaluated with respect to applicability, difficulty, and usefulness. Using the results of this analysis, the consistency of the SODA security model is characterized.

Original languageEnglish (US)
Title of host publicationFifth Annu Comput Secur Appl Conf
Editors Anon
PublisherPubl by IEEE
Pages290-298
Number of pages9
ISBN (Print)0818620064
StatePublished - Dec 1 1989
EventFifth Annual Computer Security Applications Conference - Tucson, AZ, USA
Duration: Dec 4 1989Dec 8 1989

Publication series

NameAnnual Computer Security Applications Conference

Other

OtherFifth Annual Computer Security Applications Conference
CityTucson, AZ, USA
Period12/4/8912/8/89

ASJC Scopus subject areas

  • Software
  • Engineering(all)

Fingerprint

Dive into the research topics of 'Security model consistency in secure object-oriented systems'. Together they form a unique fingerprint.

Cite this