ABSTRACT

In this part we introduced mandatory security for databases. In particular we provided a historical perspective of MLS/DBMSs and then discussed designs for MLS/DBMSs. For example, in Chapter 7 we discussed the Bell and LaPadula policy for database systems and then provided an overview of various types of MLS/DBMSs. In Chapter 8 we described various designs for MLS/DBMSs including the integrity lock architecture, operating system providing mandatory access architecture, trusted subject architecture, extended kernel architecture, and the distributed architecture.