Está en la página 1de 10

An Introduction to Multilevel Secure Relational Database

Management Systems
Walid Rjaibi

IBM Toronto Software Laboratory


Markham, Ontario, Canada
wrjaibi@ca.ibm.com

Abstract of a number of multilevel secure RDBMS so-


lutions, including commercial ones. Over the
Multilevel Security (MLS) is a capability that past few years and with the increase of secu-
allows information with different classifications rity concerns, MLS compliance has become a
to be available in an information system, with major requirement from a number U.S. Fed-
users having different security clearances and eral Government agencies that appear to have
authorizations, while preventing users from ac- grown beyond the traditional agencies that re-
cessing information for which they are not quire such type and level of security. This
cleared or authorized. It is a security policy paper introduces MLS, and outlines the chal-
that has grown out of research and develop- lenges and complexities of building a multilevel
ment efforts funded mostly by the U.S. Depart- secure RDBMS. The paper also gives concrete
ment of Defense (DoD) to address some of the examples of both research and commercial mul-
drawbacks of the single level mode of opera- tilevel secure RDBMS and describes how they
tion that was used at the DoD. The goal was met the above challenges and complexities.
to build and deploy an MLS-compliant envi-
ronment (e.g., Networks, Operating Systems,
Database Systems) that would provide a much 1 Introduction
needed efficiency in processing and distribut-
ing classified information by providing security Multilevel Security (MLS) is a capability that
through computer security, communications se- allows information with different classifications
curity, and trusted system techniques instead to be available in an information system, with
of using physical controls, administrative pro- users having different security clearances and
cedures, and personnel security. As Relational authorizations, while preventing users from ac-
Database Management Systems (RDBMS) are cessing information for which they are not
at the heart of the DoD’s information sys- cleared or authorized[2]. It is a security pol-
tem, significant research and development ef- icy that has been developed primarily for the
forts have been put into building multilevel se- U.S. military and intelligence communities, but
cure RDBMS, which have led to the emergence has also been adopted by some civilian organi-
zations that store, process and distribute clas-
c 2004 IBM Canada Ltd., 2004. Per-
sified information (e.g., major aircraft manu-
Copyright
mission to copy is hereby granted provided the original facturers) as well as by a number of defense
copyright notice is reproduced in copies made. departments around the world.

1
Given the extremely high value of the infor- often requires rebuilding major portions of an
mation that could be stored in a military or existing commercial RDBMS.
intelligence database, and the potential dam- There has been an abundance of research
age that could result from the unauthorized dis- within the last two decades or so in the
closure, alteration or loss of such information, area of multilevel secure RDBMS. Such re-
preventing users from accessing information for search has addressed specific aspects of build-
which they are not cleared or authorized re- ing a multilevel secure RDBMS such as secure
quires much more than just implementing an transaction protocols, system architectures, or
access control policy. In particular, security polyinstantiation[8], and there is a rich set of
guards must be put in place to prevent users publications about those specific aspects[8, 4,
from gaining access to information for which 9, 10]. However, the multilevel secure RDBMS
they are not cleared or authorized through in- research literature surprisingly lacks the kind
direct means. of publication that would allow someone to get
Covert channels[5] are examples of such in- a good understanding about what it takes to
direct means. A covert channel can easily build a multilevel secure RDBMS as a whole,
be established with conventional database con- as well as to serve as a quick guide for those
currency control algorithms such as two-phase who might be thinking about building such
locking (2PL) and timestamp ordering (TO)[6]. RDBMS.
In both 2PL and TO algorithms, whenever Moreover, the term multilevel security is
there is contention for the same data item by heavily overloaded across the Information
transactions executing at different security lev- Technology (IT) industry and often means dif-
els, a lower level transaction may be either de- ferent things to people from different back-
layed or suspended to ensure correct execution. grounds as there are not only multilevel secure
In such a scenario, two colluding transactions RDBMS, but also multilevel secure operating
executing at high and low security levels can systems, multilevel secure networks, multilevel
establish an information flow channel from a secure webservers, etc. In addition to being
high security level to a low security level by ac- heavily overloaded, MLS is often incorrectly
cessing selected data items according to some used interchangeably with emerging market-
agreed-upon code[4]. ing terms such as Label-Based Access Control
Inference[7] is another indirect means by (LBAC), Row-Level Security, and others. All
which users can gain knowledge about infor- of this makes it extremely difficult for those
mation for which they are not cleared or au- who have not been directly involved in design-
thorized. For example, enforcing a primary key ing or building a multilevel secure RDBMS to
constraint[6] across data from different security get a good understanding about what it really
levels could allow a non sufficiently cleared user takes to build a multilevel secure RDBMS.
to gain knowledge about the existence of a data In this paper, the author wishes to share
row at a higher security level from the duplicate his expertize in database security and privacy
key error message that is returned to that user to try to clarify the mystery of multilevel se-
when he or she attempts to insert a data row curity, as well as to outline the challenges
at a low security level but having the same pri- and complexities of building a multilevel secure
mary key as the data row at the higher security RDBMS.
level.
Building a multilevel secure RDBMS has 1.1 Synopsis
thus posed significant challenges to the
database research community. For instance, The rest of this paper is organized as follows.
secure database transaction protocols had to Section 2 introduces MLS and describes the
be developed, and a solution to reconcile the MLS certification and evaluation process. Sec-
conflicting requirements between data integrity tion 3 presents and compares Multilevel Se-
and confidentiality had to be found. MLS has cure RDBMS architectures. Section 4 de-
also posed significant challenges to database scribes the issue of polyinstantiation. Section
vendors as building a multilevel secure RDBMS 5 presents multilevel secure transaction pro-

2
cessing. Section 6 gives concrete examples of information with different classifications to be
both research and commercial multilevel secure available in an information system, with users
RDBMS. Lastly, section 7 summarizes the con- having different security clearances and autho-
cepts introduced in this paper. rizations, while preventing users from accessing
information for which they are not cleared or
authorized[2]. For example, an MLS system
2 What is Multilevel Secu- might process both Secret and Top Secret col-
rity? lateral data and have some users whose maxi-
mum clearance is Secret and others whose max-
A good understanding of MLS would not be imum clearance is Top Secret. Another MLS
complete without understanding its origins, system might have all its users cleared at the
and what problems it was meant to solve. Top Secret level, but have the ability to release
The U.S. military and intelligence communities information classified as Secret to a network
have historically segregated data based upon consisting of only Secret users and systems. In
its security classification. Classified data must each of these instances, the system must im-
reside and be processed on dedicated systems plement mechanisms to provide assurance that
that do not provide access to users outside of the system’s security policy is strictly enforced.
the immediate community of interest and are MLS has resulted in a shift from providing se-
often separated by an air gap and connected curity through physical controls, administra-
only by a sneaker net[2]. The main drawbacks tive procedures, and personnel security to pro-
of such operational scheme can be summarized viding security using computer and communi-
as follows: cation security.

• Redundant databases: To store data with


different security levels (e.g., Top Secret 2.1 The Bell-LaPadula Multilevel
data and Unclassified data), a separate Security Model
database must be created and maintained
for each security level. The Basic model of MLS was first introduced
by Bell and LaPadula[11]. The model is stated
• Redundant workstations: A user who is re- in terms of objects and subjects. An object is
quired to access data with different secu- a passive entity such as a data file, a record,
rity levels (e.g., Top Secret data and Un- or a field within a record. A subject is an ac-
classified data) would be required to use tive process that can request access to objects.
a different workstation to access each type Every object is assigned a classification, and
of data. every subject a clearance. Classifications and
clearances are collectively referred to as labels.
• High cost of IT infrastructure: It is not A label is a piece of information that consists
possible to share the computer and com- of two components: A hierarchical component
munication system infrastructures, such and a set of unordered compartments. The hi-
as cabling, network components, printers, erarchical component specifies the sensitivity
and workstations without risking to com- of the data. For example, a military organi-
promise security. zation might define levels Top Secret, Secret,
• Inefficiency: Staff members need to access Confidential and Unclassified. The compart-
several systems to perform their duties. ments component is nonhierarchical. Compart-
ments are used to identify areas that describe
The U.S. DoD has therefore funded signifi- the sensitivity or category of the labeled data.
cant research and development projects across For example, a military organization might de-
various organizations to come up with a so- fine compartments NATO, Nuclear and Army.
lution that would allow classified information Labels are partially ordered in a lattice as fol-
to be stored, processed and distributed in a lows: Given two labels L1 and L2 , L1 >= L2 if
secure way, but without the drawbacks listed and only if the hierarchical component of L1
above. MLS was that solution[2]. MLS allows is greater than or equal to that of L2 , and

3
the compartment component of L1 includes the B, Mandatory Access Control (MAC)[1] is pro-
compartment component of L2 . L1 is said to vided. MAC employs the simple security prop-
dominate L2 . MLS imposes the following two erty and the *-property of the Bell-LaPadula
restrictions on all data accesses: MLS model to protect data of different secu-
rity levels. Division A also provides the MAC
• The Simple Security Property or “No Read features.
Up”: A subject is allowed a read access to Systems representative of the higher classes
an object if and only if the subject’s label in Division B and Division A derive their se-
dominates the object’s label. curity attributes more from their design and
implementation structure than merely security
• The *-Property (pronounced the star
features or functionality. Increased assurance
property) or “No Write Down”: A sub-
that the required features are operative, cor-
ject is allowed a write access to an object
rect, and tamperproof under all circumstances
if and only if the object’s label dominates
is gained through progressively more rigorous
the subject’s label.
design, implementation, and analysis during
the development process. Division A requires
2.2 Evaluation and Certification formal (e.g., mathematical) design and verifica-
Multilevel secure systems must complete an ex- tion techniques to provide increased assurances
tensive evaluation and certification process be- over Division B.
fore they can be used in military applications. Multilevel secure systems are associated with
The evaluation and certification of a multilevel TCSEC divisions B and A[2].
secure system is usually conducted by an inde-
pendent testing laboratory and is based upon
a clearly defined set of criterion. One set of
3 Multilevel Secure
criteria is called common criteria, which has RDBMS Architectures
recently been adopted as an ISO standard[3].
Another set of evaluation criteria used by the Multilevel secure RDBMS architectures can be
U.S. DoD is the Trusted Computer System divided into two general types, depending on
Evaluation Criteria (TCSEC)[5]. Most multi- whether mandatory access control is enforced
level secure RDBMS have been developed be- by the RDBMS itself or delegated to a trusted
fore common criteria was adopted. TCSEC has operating system. These two general types are
been the norm for evaluating such RDBMS. the Woods Hole Architecture and the Trusted
TCSEC is divided into four divisions: D, Subjects Architecture[9, 10].
C, B, and A ordered in a hierarchical manner
with the highest division (A) reserved for sys- 3.1 Woods Hole Architectures
tems providing the most comprehensive secu-
rity. Each division represents a major increase The Woods Hole architectures are the outcome
in the overall confidence, or trust, that one can of a three-week study on trusted data manage-
place in the system. Successive levels of trust ment sponsored by the U.S. Air Force at Woods
build upon and incorporate the criteria of the Hole, Massachusetts, USA in 1982[9, 10]. The
previous lower level of trust. subject of this study was the following: Can we
Within Divisions C and B there are a number build a multilevel secure RDBMS using existing
of subdivisions known as classes. The classes untrusted off-the-shelf RDBMS, with minimal
are also ordered in a hierarchical manner with change?
systems representative of Divisions C and B The Woods Hole architectures assume that
characterized by the set of computer security an untrusted off-the-shelf RDBMS is used to
mechanisms that they possess. For Division C, access data and that trusted code is developed
Discretionary Access Control (DAC)[6] is pro- around that RDBMS to provide an overall se-
vided, whereby users can grant or deny access cure RDBMS. They can be divided into two
by other users and groups of users to the system main categories: The kernelized architectures
resources that the users control. For Division and the distributed architectures[9, 10].

4
High User Low User
3.1.1 Kernelized Architectures

High Trusted Low Trusted


The kernelized architecture[9, 10] uses a Front End Front End

trusted operating system and multiple copies


of an off-the-shelf RDBMS, where each copy is
associated with some trusted front-end. Each
pair (trusted front-end, RDBMS) is associated
with a particular security level. The trusted High RDBMS Low RDBMS

operating system enforces its full access control


policy on all accesses by the RDBMS to the
RDBMS objects. It ensures that data at dif-
ferent security levels is stored separately, and Trusted Operating System

that each copy of the RDBMS gets access to


data that is authorized for its associated secu-
rity level. The latter is possible because the
multilevel database is decomposed into mul- High Data Low Data

tiple single-level databases, where each repre-


sents a fragment of the conceptual multilevel
database. Each fragment is stored in a single- Figure 1: Multilevel secure kernelized RDBMS
level operating system object (e.g., a file) which architecture.
is labeled by the operating system at the cor-
responding security level, and thus can only be
accessed according to the MAC policy of the 3.1.2 Distributed Architectures
operating system. The distributed (or replicated) architecture[9,
10] is a variation of the kernelized architec-
Figure 1 illustrates a kernelized architec-
ture. It uses multiple copies of the trusted
ture where one RDBMS is associated with
front-end and RDBMS, each associated with
the security level “High” and another RDBMS
its own database storage. In this architecture
is associated with the security level “Low”.
scheme, an RDBMS at security level l contains
The RDBMS associated with the security level
a replica of every data item that a subject
“High” has access to both the fragment of the
at level l can access. Thus, when data is re-
database at the high security level and the frag-
trieved, the RDBMS retrieves it only from its
ment of the database at the low security level.
own database. Another benefit of this archi-
But the RDBMS associated with the security
tecture is that data is physically separated into
level “Low” has access only to the fragment of
separate hardware databases. However, this
the database at the low security level.
scheme results in an additional overhead when
A benefit of this architecture is that data data is updated as the various replicas need to
at different security levels is isolated in the be kept in sync.
database, which allows for higher level assur-
ance. Another benefit is that, assuming an al- 3.2 Trusted Subjects Architec-
ready evaluated operating system, this archi-
tures
tecture should minimize the amount of time
and effort to evaluate the RDBMS. However, The trusted subject architecture[9] is a scheme
this architecture results in an additional over- that contains a trusted RDBMS and a trusted
head as the trusted operating system needs to operating system. According to this architec-
separate data at different security levels when it ture, the mandatory access control policy is
is added to the database and might also need enforced by the RDBMS itself. Database ob-
to combine data from different security levels jects (e.g., a table) are stored in operating sys-
when data is retrieved by an RDBMS copy that tem objects (e.g., a file) labeled at the high-
is associated with a high security level. est security level. A database table can con-

5
tain rows with different security levels. Such also difficult to prove that the trusted software
rows are distinguished based on their security used to isolate mandatory objects (e.g., data
level which is explicitly stored with each row. rows with different security levels) is working
This architecture is called “trusted subject” be- correctly without allowing for the flow of data
cause the RDBMS is privileged to violate the with high security level to users with low secu-
operating system’s MAC policy when access- rity level.
ing database objects. For example, when a user
with a low security level queries a database ta-
ble, the operating system’s object where that 4 Polyinstantiation
table is stored ends up being accessed, which
is a violation of the operating system’s MAC Multilevel secure RDBMS utilize mandatory
policy. But the RDBMS is trusted to return access control to prevent the unauthorized dis-
to the users only those rows for which he or closure of high-level data to low-level users. It
she is authorized according to the MAC policy. is also necessary to guard against the threat
Figure 2 illustrates a multilevel secure trusted to confidentiality that can arise from enforcing
subject RDBMS Architecture. database integrity constraints[6] across data
from multiple security levels. To illustrate this
High User Low User threat to confidentiality, consider the following
database table where the attribute “starship”
Untrusted Untrusted is the primary key, and the attribute “label”
Front End Front End represents the data row security level.

Starship Destination Label


Enterprise Mars High
Trusted RDBMS

Suppose that a user with a low security level


wishes to insert the tuple (Enterprise, Talos,
Trusted Operating System
Low). From a purely database perspective, this
insert must be rejected because it violates the
primary key constraint. However, rejecting this
insert could be sufficient to compromise secu-
rity as the user with low security level could
Database
infer that the starship Enterprise is on a mis-
sion with a higher security level.
Polyinstantiation[8] is a solution to this
problem. It expands the notion of primary key
Figure 2: Multilevel secure trusted subject to include the security level so that more than
RDBMS architecture. one tuple may possess the same apparent pri-
mary key if they are at different security lev-
A benefit of this architecture is that the els. To continue with our example, a new row
RDBMS has access to all levels of data at the with the same apparent primary key (i.e., En-
same time, which minimizes retrieval and up- terprise) is added to the table.
date processing. However, this architecture re-
sults in a special purpose RDBMS that requires
a large amount of trusted code to be developed Starship Destination Label
and verified along with the normal RDBMS fea- Enterprise Mars High
tures. It also lacks the potential to be evalu- Enterprise Talos Low
ated to high TCSEC evaluation classes because
meeting higher levels of assurance requires the From a security perspective, the newly added
ability to provide separation of mandatory ob- row is simply a cover story for the real mission
jects by some form of hardware isolation. It is of the starship enterprise.

6
In addition to protecting against inference, to confidentiality that can arise from employ-
polyinstantiation is also useful to prevent de- ing conventional transaction protocols such as
nial of service to legitimate users as well as two-phase locking (2PL)[4]. The 2PL transac-
to protect against storage covert channels[5]. tion protocol delays the execution of conflict-
Covert channels use system variables and at- ing operations by setting locks on data items
tributes to signal information. To illustrate for read and write operations[6]. A transaction
this type of threat to confidentiality, consider must acquire a shared-lock (S-lock) on a data
the following database table where the at- item before reading it and an exclusive lock
tribute “starship” is the primary key, and the (X-lock) before writing it. The 2PL transac-
attribute “label” represents the data row secu- tion protocol is inherently vulnerable to timing
rity level. covet channels which could be established to
leak confidential information. A timing covert
channel [5] varies the amount of time to com-
Starship Destination Label plete a task to signal information. To illustrate
Enterprise Talos Low this threat to confidentiality, consider the fol-
lowing example.
Now, suppose that a user with a high secu-
Let Ti denote a high security level transac-
rity level wishes to update the destination to
tion, which is reading a low security level data
be “Mars”. If the RDBMS rejects this update,
item A. Let Tj denote a low security level
then the user may have been denied legitimate
transaction, which is trying to write to data
privileges. If the update is allowed by changing
item A. If the 2PL transaction protocol is em-
the row’s security level to “High” then a user
ployed, then Tj must wait to acquire an X-lock
with a low security level will notice that the
on data item A (i.e., wait until Ti releases its
data row has disappeared and will infer that its
S-lock on data item A). Suppose that Tj can
security level has been increased. If the update
measure the time quantum q it has to wait to
is allowed without changing the row’s security
acquire the lock on data item A: A quantum
level, then a storage covert channel will be cre-
of waiting time greater than a certain amount
ated. That is, the data row itself could be used
represents ’1’, and a quantum of waiting time
as a storage object for passing high level infor-
less than that a certain amount represents ’0’.
mation to users with low security level. Polyin-
Transaction Ti can exploit this knowledge to
stantiation allows the RDBMS to insert a new
send one bit of high security level information
data row with the same apparent primary key
to Tj , and by repeating this protocol, any in-
(i.e., Enterprise) but with a high security level
formation can be sent, creating a timing covert
as a result of such update.
channel.
2PL, and in general conventional transaction
Starship Destination Label protocols in RDBMS, are not secure against
Enterprise Talos Low timing covert channels.
Enterprise Mars High

From a security perspective, the old data row 6 Commercial and Re-
is simply a cover story for the real mission of
the starship enterprise. search Multilevel Secure
RDBMS
5 Multilevel Secure Trans- The research and development efforts in the
action Processing area of multilevel secure RDBMS have re-
sulted in a number of commercial and research
Multilevel secure RDBMS utilize mandatory systems. The most noticeable of these sys-
access control to prevent the unauthorized dis- tems are the following: Trusted Oracle[12],
closure of high-level data to low-level users. It Informix OnLine/Secure[13], Sybase Secure
is also necessary to guard against the threat SQL Server[14], DB2 for z/OS[15], Trusted

7
Rubix[16], SEAVIEW[8], and Unisys Secure Oracle is running in OS MAC mode.
Distributed DBMS[17]. Informix OnLine/Secure and Trusted Ora-
Trusted Oracle can be configured to run in cle provide secure transaction processing pro-
one of two modes: DBMS MAC and OS MAC. tocols. Informix OnLine/Secure uses an ap-
The former is an architecture where mandatory proach by which a transaction at a low security
access control is enforced by the RDBMS it- level can acquire a write lock on a low data item
self, and thus is a trusted subject architecture. even if a transaction at a high security level
The latter is a kernelized architecture (i.e., holds a read lock on that data item. Thus, a
mandatory access control is delegated to the transaction at a low security level is never de-
operating system). Informix OnLine/Secure, layed by a transaction at a high security level.
Sybase Secure SQL Server, DB2 for z/OS, and The transaction at the high security level sim-
Trusted Rubix are examples of a trusted sub- ply receives a warning that a lock on a low data
ject architecture. The SEAVIEW research sys- item has been “broken”. Trusted Oracle uses
tem is an example of a kernelized architecture a combination of locking and multiversioning
whereas the Unisys Secure Distributed research techniques.
RDBMS is an example of a distributed archi-
tecture.
Informix OnLine/Secure, Sybase Secure SQL 7 Conclusion
Server, Trusted Oracle, and Trusted Rubix all
support polyinstantiation. The key for a tu- This paper has given an overview of multilevel
ple in Informix OnLine/Secure automatically security, the MLS evaluation and certification
includes the tuple security label. Thus, polyin- process, and multilevel secure RDBMS. Build-
stantiation is always possible and cannot be ing a multilevel secure RDBMS can be a chal-
suppressed by the RDBMS. lenging task. Depending on the architecture
The tuple security label in the Sybase Secure followed, this might require rebuilding major
SQL Server is part of all keys. Thus, polyin- portions of an existing commercial RDBMS. It
stantiation is always possible and cannot be also requires significant effort to evaluate and
suppressed by the RDBMS. certify, particularly if a high level of assurance
Trusted Oracle can be configured to run in is sought. We are not aware of any commercial
one of two modes. When run in DBMS MAC RDBMS that has been evaluated higher than
mode, a single Trusted Oracle database can B1 according to the Trusted Computer Secu-
store information at multiple security levels. In rity Evaluation Criteria.
this mode, Trusted Oracle can turn polyinstan- Mandatory access control, polyinstantiation,
tiation on and off at the table level by requiring and secure transaction processing are the key
key integrity which does not include the tuple aspects of a multilevel secure RDBMS. How-
security label. When on, the primary key in- ever, these are not sufficient to ensure that se-
cludes the tuple label, which allows polyinstan- curity cannot be compromised. Depending on
tiation to occur. When off, the key does not in- how stringent the requirements of the organi-
clude the tuple security label, thus preventing zation that wishes to deploy a multilevel secure
polyinstantiation. RDBMS, the RDBMS might have to imple-
When run in OS MAC mode, Trusted Oracle ment additional security guards. For example,
is capable of storing data at only a single secu- SQL compilers have traditionally been guided
rity label, and the RDBMS is constrained by by performance reasons in selecting the order
the underlying operating system MAC policy. in which the predicates contained in a query
Without any MAC privilege, the RDBMS can- are evaluated (i.e., more selective predicates
not suppress polyinstantiation because a low are often evaluated first to narrow down the
RDBMS will not be aware of any tuple with set of rows to be passed on to a subsequent
the same primary key at a higher security level, join because join operations are costly). If the
and a high RDBMS cannot be trusted to mod- method chosen to enforce MAC when access-
ify data at a low security level. As such, polyin- ing a table is based on query modification to
stantiation cannot be prevented when Trusted incorporate the MLS two security properties in

8
the form of regular predicates, then special care About the Author
must be taken in selecting the order in which
the predicates on that table are evaluated to Walid Rjaibi joined IBM in 1996. He ini-
avoid unauthorized leakage of data rows. To il- tially worked at the IBM Toronto Lab within
lustrate how leakage could occur, suppose that the DB2 UDB query optimization team for five
a query has a predicate on a table that involves years. In this role, Walid was the architect
a User-Defined Function (UDF). Further sup- and author of several innovative solutions in-
pose that this UDF takes the whole data row as cluding the extensions made to the DB2 statis-
an input parameter and that the UDF source tics model to support parallel database envi-
code makes a copy of the data row outside the ronments and the query performance simula-
database (or sends it as an e-mail to some des- tor. Walid then joined IBM Research in Zurich,
tination). Now, assume that some data row R Switzerland (ZRL) where he worked as a Re-
cannot be returned to the user who issued the search Staff Member in Network Security and
query because this would violate the MLS se- Cryptography for two years. At ZRL, he was
curity properties. If the predicate involving the an active member of the IBM Privacy Technol-
UDF is evaluated prior to evaluating the pred- ogy Institute (PTI) where he developed innova-
icates that implement the MLS security prop- tive solutions for enabling RDBMS to automat-
erties then data row R will be consumed by the ically enforce privacy policies. Walid returned
UDF and consequently leaked to an unautho- to the IBM Toronto Lab in March 2003 where
rized user. he joined the newly formed DB2 UDB security
Database triggers[6] are another example development team. He has authored several
where additional security guards could be nec- research and technical papers on database se-
essary. A trigger could cause labeled data row curity and privacy, and holds a patents portfo-
to flow from a table on which mandatory ac- lio of eleven filed or granted patents. Walid
cess control is enforced to another table on holds a Computer Engineer degree from the
which mandatory access control is not enforced. University of Tunis (Tunisia), and a Masters
Without proper flow control measures, triggers degree in Computer Science from Laval Uni-
could cause unauthorized leakage of informa- versity (Canada).
tion to occur.

Acknowledgements References
The author wishes to thank Calisto Zuzarte [1] W. Rjaibi, P. Bird. A Multi-Purpose Im-
and Kelly Lyons from the IBM Toronto Labo- plementation of Mandatory Access Control
in Relational Database Management Systems.
ratory for their suggestion to write a CASCON
In Proc. of the 30th International Conference
paper about multilevel secure RDBMS. on Very Large Databases, Toronto, Canada,
2004.
Trademarks [2] Department of Defense. Multilevel Security
in the Department Of Defense: The Basics.
IBM and Informix are registered trademarks http://nsi.org/Library/Compsec/sec0.html.
of International Business Machines Corpora- [3] The official website of the Common Criteria
tion in the United States, other countries, or Project
both. Other company, product and service http://www.commoncriteriaportal.org/
names may be trademarks or service marks of [4] V. Atluri, S. Jajodia, T. F. Keefe, C. MaCol-
others. lum, R. Mukkamal. Multilevel Secure Trans-
action Processing: Status and Prospects.
Database Security, X: Status and Prospects,
Disclaimer Chapman & Hall 1997, eds. Pierangela Sama-
rati and Ravi Sandhu.
The views expressed in this paper are those of [5] Trusted Computer Security Evaluation Crite-
the authors and not necessarily of IBM Canada ria, DoD 5200.28-STD. U.S. Department of
Ltd. or IBM Corporation. Defense, 1985.

9
[6] R. Elmasri, S. Navathe. Fundamentals of
Database Systems. ISBN 0-201-54263-3,
Addison-Wesley, 2000.
[7] S. Jajodia, R. Sandhu. Toward a Multi-
level Secure Relational Data Model. In Proc.
of ACM SIGMOD, Denver, Colorado, USA,
1991.
[8] D. E. Denning. The Sea View Security Model.
In Proc. of the IEEE Symposium on Security
and Privacy, Oakland, California, USA, 1988.
[9] M. D. Abrams, S. Jajodia, H. J. Podell. In-
formation Security An Integrated Collection
of Essays. IEEE Computer Society Press, Los
Alamitos, CA, USA, 1995.
[10] S. Castano, et al. Database Security. ACM
Press, New York, NY, USA, 1995.
[11] E. Bell, L. J. LaPadula. Secure computer sys-
tems: Unified exposition and multics inter-
pretation. Technical Report MTR-2997, The
Mitre Corporation, Burlington Road, Bed-
ford, MA 01730, USA.
[12] Oracle Corporation. Trusted Oracle Admin-
istrator’s Guide. Redwood City, CA, USA,
1992.
[13] Informix. Informix OnLine/Secure Adminis-
trator’s Guide. Menlo Park, CA, USA, 1993.
[14] Sybase Inc. Building Applications for Secure
SQL Server, Sybase Secure SQL Server Re-
lease 10.0. Emeryville, CA, USA, 1993.
[15] IBM Corporation. DB2 UDB for z/OS V8
Administration Guide. 2004.
[16] National Computer Security Center. Polyin-
stantaition Issues in Multilevel Secure Rela-
tional Database Management Systems. NCSC
Technical Report - 005, Volume 3/5, Library
No. S-243,039, May 1996.
[17] LouAnna Notargiacomo. Architectures for
MLS Database Management Systems. Infor-
mation Security:An Integrated Collection of
Essays, IEEE Computer Society Press, Los
Alamitos, California, USA.

10

También podría gustarte