Providing security and interoperation of heterogeneous systems

被引:56
作者
Dawson, S [1 ]
Qian, S
Samarati, P
机构
[1] SRI Int, Comp Sci Lab, Menlo Pk, CA 94025 USA
[2] SecureSoft Inc, Redwood Shores, CA 94065 USA
[3] Univ Milan, Dipartimento Sci Informaz, I-26013 Crema, Italy
基金
美国国家科学基金会;
关键词
secure interoperation; mandatory access control; query processing;
D O I
10.1023/A:1008787317852
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Interoperation and information sharing among databases independently developed and maintained by different organizations is today a pressing need, if not a practice. Governmental, military, financial, medical, and private institutions are more and more required to become part of a distributed infrastructure and selectively share their data with other organizations. This sharing process inevitably opens the local system to new vulnerabilities and enlarges the space of possible threats to the data and resources it maintains. As a complicating factor, in general, data sources are heterogeneous both in the data models they adopt and in the security models by which protection requirements are stated. We present a modeling and architectural solution to the problem of providing interoperation while preserving autonomy and security of the local sources based on the use of wrappers and a mediator. A wrapper associated with each source provides a uniform data interface and a mapping between the source's security lattice and other lattices. The mediator processes global access requests by interfacing applications and data sources. The combination of wrappers and mediator thus provides a uniform data model interface and allows the mapping between restrictions stated by the different security policies. We describe the practical application of these ideas to the problem of trusted interoperation of health care databases, targeted to enforcing security in distributed applications referring to independent heterogeneous sources protected by mandatory policy restrictions. We describe the architecture and operation of the system developed, and describe the tasks of the different components.
引用
收藏
页码:119 / 145
页数:27
相关论文
共 26 条
[1]  
[Anonymous], IEEE T SOFTWARE ENG
[2]  
BELL D, 1974, SECURE COMPUTER SYST
[3]  
BISKUP J, 1999, DATABASE SECURITY, V12
[4]  
BONATTI P, 1996, P 4 EUR S RES COMP S
[5]  
CANDAN KS, 1996, P 12 INT C DAT ENG I
[6]  
DAWSON S, 1998, P IFIP 14 INT C INF
[7]  
DAWSON S, 1997, P 1997 DOD DAT C SAN
[8]  
DAWSON S, 1996, QUERY FOLDING FUNCTI
[9]  
DAWSON S, 1997, OPTIMIZATION TECHNIQ
[10]  
DENNING DE, 1987, SECURE DISTRIBUTED D