RDBMSPPT
RDBMSPPT
ON
DATABASE SECURITY
CONTENTS
WHY WE NEED ACCESS CONTROL?
ACCESS CONTROL
FLOW CONTROL
ENCRYPTION
WHAT IS ACCESS CONTROL
ACCESS CONTROL IS A SECURITY TECHNIQUE THAT CAN BE
USED TO REGULATE WHO OR WHAT CAN VIEW OR USE
RESOURCES IN AN COMPUTING ENVIRONMENT.
LEVEL 1
LEVEL 2 LEVEL3
COMMUNICATION LINK
CONT….
It is described in terms of subjects (for example,
users, accounts, programs), objects (for example,
relations or tables, tuples, columns, views,
operations), security classes (for example, TS, S, C or
U) and clearances.
The Bel-LaPadula model classifies each subject and
object into one of the security classifications TS, S, C
or U.
The security classes in a system are organized
according to a particular order, with a most secure
class and a least secure class.
CONT….
PROPERTIES OF BELL-LAPADULA MODEL:
Simple security property: In this case, a subject S is not
allowed read access to an object O unless classification of
subject S is greater than or equal to classification of an
object O. In other words