DID YOU KNOW? DTIC has over 3.5 million final reports on DoD funded research, development, test, and evaluation activities available to our registered users. Click HERE
to register or log in.
The Architectural Design of a Secure Data Base Management System.
OHIO STATE UNIV COLUMBUS COMPUTER AND INFORMATION SCIENCE RESEARCH CENTER
Pagination or Media Count:
In recent years computers have become increasingly central to the functioning of organized society. One of their most critical tasks has been the storage and processing of large amounts of data. These systems go by many names computer data bank, management information systems, command and control system -- just to name a few. All of these systems have one thing in common a large data base that may be accessed by multiple users. The need to share this information is obvious maintaining a separate copy of the data for each user would be totally impractical due to its cost and complexity. As data bases become larger and proliferate throughout industry and government we will see a steady growth in the amount of sensitive information stored in computer systems. If we expect to allow sharing of a data base, we must provide a secure system to prevent misuse of data. Unless a user is assured that his sensitive data is protected from unauthorized access, he will not allow it to be stored in the system. Sharing of these data bases will increase markedly as networking develops. Furthermore, many societies will not tolerate violation of a citizens privacy because of non-secured data bases. Governments may soon impose legal restrictions on the contents of data bases that are inadequately secured.
APPROVED FOR PUBLIC RELEASE