Add to Book Shelf
Flag as Inappropriate
Email this Book

Ncsc Technical Report - 005 Volume 2/5 Library No. S-243,039

By Brewster, Keith F.

Click here to view

Book Id: WPLBN0000697932
Format Type: PDF eBook:
File Size: 0.2 MB
Reproduction Date: 2005

Title: Ncsc Technical Report - 005 Volume 2/5 Library No. S-243,039  
Author: Brewster, Keith F.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

F. Brewste, B. K. (n.d.). Ncsc Technical Report - 005 Volume 2/5 Library No. S-243,039. Retrieved from http://www.self.gutenberg.org/


Description
Technical Reference Publication

Excerpt
Introduction: This document is the second volume in the series of companion documents to the Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria [TDI 91;DoD 85]. This document examines entity and referential integrity issues in multilevel secure (MLS) database management systems and summarizes the research to date in these areas.

Table of Contents
TABLE OF CONTENTS SECTION PAGE 1.0 INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 BACKGROUND AND PURPOSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 SCOPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.3 INTRODUCTION TO ENTITY AND REFERENTIAL INTEGRITY. . . . . . . . . . . . . . . . 2 1.4 AUDIENCES OF THIS DOCUMENT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.5 ORGANIZATION OF THIS DOCUMENT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.0 BACKGROUND. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1 BASIC CONCEPTS OF ENTITY AND REFERENTIAL INTEGRITY . . . . . . . . . . . . . . 6 2.2 REFERENTIAL INTEGRITY RULES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.1 DELETE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.2 UPDATE of Referenced Relation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.2.3 NSERT or UPDATE of Referencing Relation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.2.4 Additional Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.3 PROBLEMS WITH REFERENTIAL INTEGRITY CONSTRAINTS . . . . . . . . . . . . . . . 17 3.0 ENTITY AND REFERENTIAL INTEGRITY IN MLS DATABASES . . . . . . . . . . . . . . 18 3.1 RELATED TCSEC REQUIREMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.2 BASIC CONCEPTS IN MULTILEVEL RELATIONS. . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.3 THE CONCEPT OF PRIMARY KEY IN MULTILEVEL RELATIONS. . . . . . . . . . . . . 21 3.4 ENTITY INTEGRITY IN MULTILEVEL RELATIONS . . . . . . . . . . . . . . . . . . . . . . . . . 21 3.5 REFERENTIAL INTEGRITY IN MULTILEVEL RELATIONS. . . . . . . . . . . . . . . . . . . 22 3.6 ENFORCEMENT OF INTEGRITY CONSTRAINTS . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 4.0 COVERT CHANNELS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 4.1 PRIMARY KEY UNIQUENESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 4.2 ENFORCEMENT OF REFERENTIAL INTEGRITY RULES . . . . . . . . . . . . . . . . . . . . . 28 4.2.1 Enforcement of Integrity Rules When C[FK] = C[PK]. . . . . . . . . . . . . . . . . . . . . . . . . 29 4.2.2 Enforcement of Integrity Rules When C[FK] > C[PK]. . . . . . . . . . . . . . . . . . . . . . . . . 30 4.3 RELATION TO DBMS ARCHITECTURE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.0 SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.