Abstract
This paper addresses the threat to multilevel security that arises from logical inference and the semantics of the application. Such compromises of security are particularly challenging since they circumvent traditional security mechanisms and rely on a user's knowledge of the application. The problems of inference and security have heretofore been amorphous and difficult to circumscribe. We focus on these problems in the context of a multilevel database system and show their relevance to knowledge-based systems, sometimes referred to as expert systems. Here we establish a framework for studying these inference control problems, describe a representation for relevant semantics of the application, develop criteria for safety and security of a system to prevent these problems, and outline algorithms for enforcing these criteria.
Keywords
Affiliated Institutions
Related Publications
Representation and Structure in Connectionist Models
Abstract : This paper focuses on the nature of representations in connectionist models. It addresses two issues: Can connectionist models develop representations which possess i...
ASPECTS OF THE THEORY OF SYNTAX
Abstract : Contents: Methodological preliminaries: Generative grammars as theories of linguistic competence; theory of performance; organization of a generative grammar; justifi...
Finding Structure in Time
Time underlies many interesting human behaviors. Thus, the question of how to represent time in connectionist models is very important. One approach is to represent time implici...
Expectation Propagation for Exponential Families
This is a tutorial describing the Expectation Propagation (EP) algorithm for a general exponential family. Our focus is on simplicity of exposition. Although the overhead of tra...
Encouraging Best Practice in Quantitative Management Research: An Incomplete List of Opportunities*
abstract The paper identifies some common problems encountered in quantitative methodology and provides information on current best practice to resolve these problems. We first ...
Publication Info
- Year
- 1987
- Type
- article
- Pages
- 357-373
- Citations
- 118
- Access
- Closed
External Links
Social Impact
Social media, news, blog, policy document mentions
Citation Metrics
Cite This
Identifiers
- DOI
- 10.1145/38713.38752