Research of Security Mechanisms Based on LogicSQL Database

Article Preview

Abstract:

LogicSQL is an object relational database management system implemented with the advanced (formula-lock based) concurrency control protocol, and the steged database architecture. It is independently developed based on the Linux high-level security database system. Ministry of Science and Technology "863" Database Group of the major projects comments LogicSQL database "It is the only hope that China’s database products will be able to contend with America’s mainstream database products in the next few years." Access control policies are security policies that govern access to resources. It can be applied to several new types of databases. In this paper, we discuss access control in multilevel database management systems applies and illustrate the main applies of security mechanisms in the LogicSQL database system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

352-356

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D.E. Bell. Secure computer systems: A refinement of the mathematical model. Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA, (1973).

Google Scholar

[2] K.J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, The Mitre Corporation, Bedford, MA, April (1977).

Google Scholar

[3] D.E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5): 236–243, May (1976).

DOI: 10.1145/360051.360056

Google Scholar

[4] ORACLE DATA SHEET, Oracle Ultra Search, http: /www. oracle. com/index. html, February (2011).

Google Scholar

[5] Enterprise Portal Overview and User Guide, Sybase Enterprise Portal, LAST REVISED: May (2000).

Google Scholar

[6] Yuan Liyan, ShiFang Enterprise Information RealTime Archive and SearchSystem. http: /www. shifang. com. cn/products, July (2011).

Google Scholar

[7] L.Y. Yuan, The Documentation of Logic SQL. Alberta University Press, Canada. 2005, pp.1-15.

Google Scholar

[8] P. Samartini and S. D. Capitani di Vimercati. Access Control: Policies, Models, and Mechanisms. In Foundations of Security Analysis and Design: Tutorial Lectures, Lecture Notes in Computer Science, vol. 2171, pp.137-193, (2001).

DOI: 10.1007/3-540-45608-2_3

Google Scholar

[9] Y. Huang, X.Q. Ma, D.N. Li and R. Wu. Research and Applications of Access Control Based on LogicSQL Database System. Advanced Materials Research (AMR) Journal, 2010, 143(144): 672-676.

DOI: 10.4028/www.scientific.net/amr.143-144.672

Google Scholar

[10] X.Q. Ma, Y. Huang and B. Lv. Enterprise Search Services and Application of Security Database System. Advanced Materials Research (AMR) Journal, 2010, 143(144): 557-561.

DOI: 10.4028/www.scientific.net/amr.143-144.557

Google Scholar