Download presentation
Presentation is loading. Please wait.
Published byLaureen Baker Modified over 9 years ago
1
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Secure Object Data Management Systems February 17, 2005
2
Outline l Background on object systems l Discretionary security l Multilevel security l Objects for modeling secure applications
3
Concepts in Object Database Systems l Objects- every entity is an object - Example: Book, Film, Employee, Car l Class - Objects with common attributes are grouped into a class l Attributes or Instance Variables - Properties of an object class inherited by the object instances l Class Hierarchy - Parent-Child class hierarchy l Composite objects - Book object with paragraphs, sections etc. l Methods - Functions associated with a class
4
Example Class Hierarchy Document Class D1 D2 Book Subclass B1 # of Chapters Volume # Print-doc-att(ID) Method1 : Journal Subclass J1 Print-doc (ID) Method2: ID Name Author Publisher
5
Example Composite Object Composite Document Object Section 1 Object Section 2 Object Paragraph 1 Object Paragraph 2 Object
6
Security Issues l Access Control on Objects, Classes, Attributes etc. l Execute permissions on Methods l Multilevel Security l Security impact on class hierarchies l Security impact on composite hierarchies
7
Objects and Security Secure OOM Unified Object Model is Evolving Secure OODB Persistent data store Secure OODA Design and analysis Secure DOM Infrastructure Secure OOPL Programming language Secure Frameworks Business objects Secure OOT Technologies
8
Access Control
9
Access Control Hierarchies
10
Secure Object Relational Model
11
Policy Enforcement
12
Sample Systems
13
Multilevel Security
14
Some Security Properties l Security level of an instance must dominate the level of the class l Security level of a subclass must dominate the level of the superclass l Classifying associations between two objects l Method must execute at a level that dominates the level of the method
15
Multilevel Secure Object Relational Systems
16
Sample MLS Object Systems
17
Objects for Secure Applications
18
Object Modeling
19
Dynamic Model
20
Functional Model
21
UML and Policies
22
Directions l Many of the concepts have been transferred to Object Relational data systems such as Oracle 8i and beyond l UML for Security applications is becoming common practice l Secure distributed object systems has gained popularity l Evolution into secure object-based middleware l Secure object-based languages l Integrating security and real-time for object systems
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.