{"title":"Computer architectures, database security, and an evaluation metric","authors":"R. Henning, B. Hubbard, S. A. Walker","doi":"10.1109/ICDE.1987.7272419","DOIUrl":null,"url":null,"abstract":"There are various computer architectures that will support database management applications. The distinction between the security concerns of a database management system and an operating system are not well defined. Both can provide same data security to user applications. The question is how to divide the security controls between the two. This paper details the fundamental security requirements for a database management system, and the operating system security features that a database management system could take advantage of to enhance its own security. A metric for quantifying the security functions of an operating system, the Department of Defense Trusted Computer Systems Evaluation Criteria, is discussed, as is its potential application to database security assessment.","PeriodicalId":145433,"journal":{"name":"1987 IEEE Third International Conference on Data Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1987-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1987 IEEE Third International Conference on Data Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDE.1987.7272419","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
There are various computer architectures that will support database management applications. The distinction between the security concerns of a database management system and an operating system are not well defined. Both can provide same data security to user applications. The question is how to divide the security controls between the two. This paper details the fundamental security requirements for a database management system, and the operating system security features that a database management system could take advantage of to enhance its own security. A metric for quantifying the security functions of an operating system, the Department of Defense Trusted Computer Systems Evaluation Criteria, is discussed, as is its potential application to database security assessment.