Download presentation
Presentation is loading. Please wait.
Published byRafe Thompson Modified over 9 years ago
1
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - II February 12, 2007
2
Outline l Security Constraint Processing l Use of Conceptual Structures
3
Security Constraint Processing l Security Constraints are rules that assign security levels to the data l MLS/DBMS is augmented with an Inference Engine l Inference Engine is the Inference Controller l Integrated Architecture for Security Constraint processing - Query, Update and Database design operations
4
Inference Engine Approach
5
Constraint Generation
6
Query Processor
7
Update Processor
8
Database Design Tool
9
Integrated Architecture
10
Release Control Management
11
Use of Conceptual Structures l Use conceptual structures to model the application - E.g., semantic data models, semantic nets, conceptual graphs, etc. l Use the reasoning strategy of the conceptual structure and determine if security violation via inference can occur
12
Multilevel Semantic Nets
13
Complex Multilevel Semantic Net REAGAN Passengers Carries SUNExplosive Mediterranean Sea 16 June 2000 India Italy Destination Location Date Smith Captain Battle Management 20 years Skills Type
14
ISA/AKO Links
15
Example Rules - II
16
SHIPS WEAPONS (d) REAGAN SHIP ISA PERSON Has Captain SHIPS WEAPONS (d) REAGAN SHIP ISA PERSON Has Captain SHIPS WEAPONS (e) REAGAN India Destination COUNTRY ISA Destination
17
Applying Transfer Rules REAGAN SUN Explosive Mediterranean Sea India Destination Location Carries Type (a) REAGAN SUN Explosive Mediterranean Sea India Location Carries Type (b) Smith Battle Management Skills REAGAN SUN Explosive Mediterranean Sea India Destination Location Carries Type (c) Combines (a) and (b) Smith Battle Management Skills
18
Security Constraints SHIPS WEAPONS Carries (a) REAGAN SUN SHIPS Destination Carries (b) REAGAN SUN COUNTRY Mediterranean SHIPS WEAPONS Carries (a) REAGAN SUN SHIPS Destination Carries (b) REAGAN SUN COUNTRY Mediterranean Location
19
Security Constraint Violation - I
20
Security Constraint Violation - II
21
Universal and Existential Conditionals
22
Matching Vectors
23
Matching and Binding Carries FLORIDA MOON Type Capital (c ) Results from (a) and (b) Carries Location (a) SHIP: ALL X Mediterranean WEAPONS: SOME Y India Destination Explosive REAGAN SUNExplosive Mediterranean Sea India Location Smith Captain Battle Management New Delhi Skills Type Carries FLORIDA MOON Type Capital (b) REAGAN SUNExplosive Mediterranean Sea India Location Smith Captain Battle Management New Delhi Skills Type Carries FLORIDA MOON Type Capital (c ) Results from (a) and (b) Destination Carries Type Carries
24
Negative Statements
25
Refutation SHIPS WEAPONS DESTINATION REAGAN Pacific Ocean WEAPONS Australia (a) SHIPS WEAPONS DESTINATION REAGAN Australia XX SHIPS WEAPONS FLORIDA REAGAN WEAPONS Australia (c ) DESTINATION (b) SHIPS FLORIDA WEAPONS Australia DESTINATION SHIPS FLORIDA WEAPONS Australia LOCATION WEAPONSREAGAN Pacific Ocean WEAPONSREAGAN Pacific Ocean (d) SHIPS WEAPONS FLORIDA REAGAN WEAPONS Australia DESTINATION LOCATION WEAPONS Pacific Ocean (e) LOCATION
26
Directions l Inference problem is still being investigated l Census bureau still working on statistical databases l Need to find real world examples in the Military world l Inference problem with respect to medial records l Much of the focus is now on the Privacy problem l Privacy problem can be regarded to be a special case of the inference problem
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.