Merging heterogeneous security orderings

25Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The problem of integrating multiple heterogeneous legacy databases is an important problem. Many papers [7, 9, 3] to date on this topic have assumed that all the databases comprising a mediated/federated system share the same security ordering. This assumption is often not true as the databases may have been developed independently by different agencies at different points in time. In this paper, we present techniques by which we may merge multiple security orderings into a single unified ordering that preserves the security relationships between orderings. We present a logic programming based approach, as well as a graph theoretical approach to this problem.

Cite

CITATION STYLE

APA

Bonatti, P. A., Sapino, M. L., & Subrahmanian, V. S. (1996). Merging heterogeneous security orderings. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1146, pp. 183–197). Springer Verlag. https://doi.org/10.1007/3-540-61770-1_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free