Merging heterogeneous security orderings

P. A. Bonatti*, M. L. Sapino, V. S. Subrahmanian

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

13 Scopus citations

Abstract

The problem of integrating multiple heterogeneous legacy databases is an important problem. Many papers <3,7,9] to date on this topic have assumed that all the databases comprising a mediated/federated system share the same security ordering. This assumption is often not true as the databases may have been developed independently by different agencies at different points in time. In this paper, we present techniques by which we may merge multiple security orderings into a single unified ordering that preserves the security relationships between orderings. We present a logic programming based approach, as well as a graph theoretical approach to this problem.

Original languageEnglish (US)
Pages (from-to)3-29
Number of pages27
JournalJournal of Computer Security
Volume5
Issue number1
DOIs
StatePublished - 1997
Externally publishedYes

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Merging heterogeneous security orderings'. Together they form a unique fingerprint.

Cite this