Merging heterogeneous security orderings

P. A. Bonatti*, M. L. Sapino, V. S. Subrahmanian

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

13 Scopus citations


The problem of integrating multiple heterogeneous legacy databases is an important problem. Many papers <3,7,9] to date on this topic have assumed that all the databases comprising a mediated/federated system share the same security ordering. This assumption is often not true as the databases may have been developed independently by different agencies at different points in time. In this paper, we present techniques by which we may merge multiple security orderings into a single unified ordering that preserves the security relationships between orderings. We present a logic programming based approach, as well as a graph theoretical approach to this problem.

Original languageEnglish (US)
Pages (from-to)3-29
Number of pages27
JournalJournal of Computer Security
Issue number1
StatePublished - 1997
Externally publishedYes

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'Merging heterogeneous security orderings'. Together they form a unique fingerprint.

Cite this