World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Ncsc Technical Report - 005 Volume 2/5 Library No. S-243,039

By Brewster, Keith F.

Click here to view

Book Id: WPLBN0000697932
Format Type: PDF eBook
File Size: 176.20 KB.
Reproduction Date: 2005

Title: Ncsc Technical Report - 005 Volume 2/5 Library No. S-243,039  
Author: Brewster, Keith F.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Brewster, K. F. (n.d.). Ncsc Technical Report - 005 Volume 2/5 Library No. S-243,039. Retrieved from http://hawaiilibrary.net/


Description
Technical Reference Publication

Excerpt
Introduction: This document is the second volume in the series of companion documents to the Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria [TDI 91;DoD 85]. This document examines entity and referential integrity issues in multilevel secure (MLS) database management systems and summarizes the research to date in these areas.

Table of Contents
TABLE OF CONTENTS SECTION PAGE 1.0 INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 BACKGROUND AND PURPOSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 SCOPE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.3 INTRODUCTION TO ENTITY AND REFERENTIAL INTEGRITY. . . . . . . . . . . . . . . . 2 1.4 AUDIENCES OF THIS DOCUMENT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.5 ORGANIZATION OF THIS DOCUMENT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.0 BACKGROUND. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.1 BASIC CONCEPTS OF ENTITY AND REFERENTIAL INTEGRITY . . . . . . . . . . . . . . 6 2.2 REFERENTIAL INTEGRITY RULES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.1 DELETE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2.2 UPDATE of Referenced Relation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2.2.3 NSERT or UPDATE of Referencing Relation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.2.4 Additional Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.3 PROBLEMS WITH REFERENTIAL INTEGRITY CONSTRAINTS . . . . . . . . . . . . . . . 17 3.0 ENTITY AND REFERENTIAL INTEGRITY IN MLS DATABASES . . . . . . . . . . . . . . 18 3.1 RELATED TCSEC REQUIREMENTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.2 BASIC CONCEPTS IN MULTILEVEL RELATIONS. . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.3 THE CONCEPT OF PRIMARY KEY IN MULTILEVEL RELATIONS. . . . . . . . . . . . . 21 3.4 ENTITY INTEGRITY IN MULTILEVEL RELATIONS . . . . . . . . . . . . . . . . . . . . . . . . . 21 3.5 REFERENTIAL INTEGRITY IN MULTILEVEL RELATIONS. . . . . . . . . . . . . . . . . . . 22 3.6 ENFORCEMENT OF INTEGRITY CONSTRAINTS . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 4.0 COVERT CHANNELS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 4.1 PRIMARY KEY UNIQUENESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 4.2 ENFORCEMENT OF REFERENTIAL INTEGRITY RULES . . . . . . . . . . . . . . . . . . . . . 28 4.2.1 Enforcement of Integrity Rules When C[FK] = C[PK]. . . . . . . . . . . . . . . . . . . . . . . . . 29 4.2.2 Enforcement of Integrity Rules When C[FK] > C[PK]. . . . . . . . . . . . . . . . . . . . . . . . . 30 4.3 RELATION TO DBMS ARCHITECTURE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 5.0 SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

 

Click To View

Additional Books


  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from Hawaii eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.