DOC PREVIEW
UTD CS 4398 - LECTURE NOTES

This preview shows page 1-2-3-27-28-29 out of 29 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 29 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsOutlineDistributed ArchitectureData DistributionDistributed Database FunctionsSecure Distributed ArchitectureDiscretionary Security MechanismSecurity Policy IntegrationViews for SecuritySecure Distributed Database FunctionsArchitecture for Multilevel SecurityMultilevel Distributed Data ModelMLS/DDBMS FunctionsDistributed Inference ControllerInteroperability of Heterogeneous Database SystemsTechnical Issues on the Interoperability of Heterogeneous Database SystemsFederated Database ManagementSchema Integration and Transformation in a Federated EnvironmentClient-Server Architecture: ExampleSecurity IssuesTransforming Secure Data ModelsSecurity Architecture: Heterogeneous data managementSecurity Architecture: Federated data managementFederated Data and Policy ManagementIncomparable Security LevelsOverlapping Security LevelsInference ControlSecure Client-Server ComputingCommentsData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasSecurity for Distributed Data ManagementLecture #9February 13, 2006OutlineDistributed Database Systems-Architecture, Data Distribution, FunctionsSecurity Issues-Discretionary Security, Multilevel SecuritySecure Heterogeneous and Federated SystemsSome CommentsAssumption: Network is secure; focusing on securing the dataDistributed ArchitectureCommunication NetworkDistributed Processor 1DBMS 1Data-base 1Data-base 3Data-base 2DBMS 2DBMS 3Distributed Processor 2Distributed Processor 3Site 1Site 2Site 3Data DistributionEMP1SS# Name Salary1 John 20 2 Paul 303 James 404 Jill 50 605 Mary6 Jane 70 D#102020 201020DnameD# MGR10 30 40Jane David Peter DEPT1SITE 1SITE 2EMP2SS# Name Salary9 Mathew70 D#50DnameD# MGR50MathJohn PhysicsDEPT2Davi d 80 30Peter 90 4078C. Sci. English French20PaulDistributed Database FunctionsDistributed Query Processing-Optimization techniques across the databasesDistributed Transaction Management-Techniques for distributed concurrency control and recoveryDistributed Metadata Management-Techniques for managing the distributed metadataDistributed Security/Integrity Maintenance-Techniques for processing integrity constraints and enforcing access control rules across the databasesSecure Distributed Architectureglobal userlocaluserlocaluserSecureNetworkSecureNetworkSecureDistributedProcessorSecureDistributedProcessorDistributedProcessorS-DBMSDatabaseDatabaseS-DBMS S-DBMSDatabaseDatabaseDatabaseDatabaseSecureDistributedProcessorSecureDistributedProcessorDistributedProcessorSecureDistributedProcessorSecureDistributedProcessorDistributedProcessorDiscretionary Security MechanismAccess Control and AuthorizationPoliciesAdministrationPoliciesIdentification and Authentication PoliciesDiscretionarySecurityDiscretionarySecurityAccess Control and AuthorizationPolicies enforced across the databasesAdministrationPolicies enforcedacross the databasesIdentification and Authentication Policies enforcedacross the databasesDiscretionarySecurityDiscretionarySecurity for distributed database systemsSecurity Policy IntegrationNetworkDistributedMLS NetworkDistributed/NetworkDistributedIntegrated PolicySecurity Policyfor database systemASecurity Policyfor database systemBSecurity Policyfor database systemCViews for Security EMP1SS# Name Salary1 John 202 Paul 303 James 404 Jill 50605 Mary6 Jane 70D#102020201020DnameD# MGR103040JaneDavidPeterDEPT1SITE 1C. Sci.EnglishFrenchSITE 2EMP2SS# Name Salary9 Mathew70D#50DnameD# MGR50MathJohnPhysicsDEPT2David 80 30Peter 90 407820PaulEnamePaulJamesJillJaneEMP-DEPT View(all those who work in the Physics Department)Secure Distributed Database Functions Secure Distributed Database Functions:Distributed Query Processing: Enforce access control rulesduring query processing across databases; distributed inference control; consider security constraints during distributed query optimizationDistributed Transaction Management: Ensure security constraints are satisfied during transaction processing.Metadata management: Enforce access control on distributed metadataIntegrity management: Ensure that integrity of the data is maintained while enforcing security across the databasesArchitecture for Multilevel Securityglobal userlocaluserMultilevel SecureNetworkSecureDistributedProcessorMLS/DBMSMultilevelDatabaseMLS/DBMS MLS/DBMSMultilevelDatabaseMultilevelDatabaseSecureDistributedProcessorSecureDistributedProcessorMultilevel Distributed Data ModelEMP1 = SecretSS# Name Salary1 John 202 Paul 303 James 404 Jill 50605 Mary6 Jane 70D#102020201020DnameD# MGR103040JaneDavidPeterDEPT1 = UnclassifiedSITE 1C. Sci.EnglishFrenchSITE 2EMP2 = SecretSS# Name Salary9 Mathew70D#50DnameD# MGR50MathJohnPhysicsDEPT2 = UnclassifiedDavid 80 30Peter 90 407820PaulMLS/DDBMS FunctionsDistributedQueryProcessorDistributedTransactionProcessorDistributedMetadataManagerFunctionsof an MLS/DDBMS Site AFunctionsof an MLS/DDBMS Site BDistributedQueryProcessorDistributedTransactionProcessorDistributedMetadataManagerDistributed Inference ControllerNetworkDistributedInferenceControllerDistributedInferenceControllerDistributedInference ControllerDBMS DBMS DBMSDatabase Database DatabaseNetworkDistributedInferenceControllerDistributedInferenceControllerDistributedInference ControllerDBMS DBMS DBMSDatabase Database DatabaseInteroperability of Heterogeneous Database SystemsDatabase System ADatabase System BNetworkDatabase System C(Legacy)Transparent accessto heterogeneousdatabases - both usersand application programs;Query, Transactionprocessing(Relational)(Object-Oriented)Technical Issues on the Interoperability of Heterogeneous Database SystemsHeterogeneity with respect to data models, schema, query processing, query languages, transaction management, semantics, integrity, and security policiesFederated database management-Collection of cooperating, autonomous, and possibly heterogeneous component database systems, each belonging to one or more federationsInteroperability based on client-server architecturesFederated Database ManagementDatabase System ADatabase System BDatabase System CCooperating databasesystems yet maintainingsome degree ofautonomyFederation F1Federation F2Schema Integration and Transformation in a Federated EnvironmentAdapted from Sheth and Larson, ACM Computing Surveys, September 1990Component Schema for Component AComponent Schema for Component BComponent Schema for Component CGeneric Schema for


View Full Document

UTD CS 4398 - LECTURE NOTES

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download LECTURE NOTES
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view LECTURE NOTES and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view LECTURE NOTES 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?