Claims
- 1. Apparatus for design of a multilevel secure database management system based on a multilevel logic programming system comprising:
- a multilevel knowledge base including:
- (a) a multilevel database in which data are classified at different security levels;
- (b) schema which describe the data in the database;
- (c) rules which are used to deduce new data;
- (d) integrity constraints which are constraints enforced on the data;
- (e) security constraints which are rules that assign security levels to the data;
- users cleared to the different security levels for querying the multilevel database; and
- a multilevel logic programming system for accessing the multilevel knowledge base for processing queries and for processing the integrity and security constraints,
- whereby the multilevel database management system (1) makes deductions and gives complete answers to queries and (2) prevent certain unauthorized inferences.
- 2. Apparatus of claim 1 wherein the multilevel logic programming system is based on a nonmonotonic typed multilevel logic whose syntax comprises the following entities:
- (1) primitive symbols,
- (2) terms,
- (3) atomic formulas,
- (4) well-formed formulas;
- each entity having a type and a security level, and
- whose semantics comprises assignment of truth values to the entities which vary with different security levels thereby making the logic nonmonotonic.
- 3. Apparatus of claim 2 wherein the design of the multilevel logic programming system is based upon nonmonotonic typed multilevel logic and comprises a methodology for processing queries of the users at different security levels.
- 4. The apparatus of claims 1, 2 or 3 wherein the multilevel database, the schema, the integrity constraints and the security constraints are expressed as formulas of a nonmonotonic typed multilevel logic and the multilevel logic programming system processes the formulas to answer queries of users at different security levels.
- 5. The apparatus of claim 4 wherein only part of the multilevel database, the schema, the integrity constraints and the security constraints are expressed as formulas of a nonmonotonic typed multilevel logic, and the multilevel logic programming system processes the formulas to answer queries at different security levels, the rest being performed by an existing multilevel secure database management system.
Parent Case Info
This is a continuation-in-part of application entitled, "Apparatus and Method for Security Constraint Processing in Multilevel Secure Database Management Systems," by Bhavani Thuraisingham et al., filed Sep. 27, 1991, and accorded Ser. No. 07/767,258, now U.S. Pat. No. 5,355,474, issued Oct. 11, 1994.
US Referenced Citations (5)
Number |
Name |
Date |
Kind |
4962533 |
Krueger et al. |
Oct 1990 |
|
5058033 |
Bonissone et al. |
Oct 1991 |
|
5119318 |
Paradies et al. |
Jun 1992 |
|
5191638 |
Wakami et al. |
Mar 1993 |
|
5208898 |
Funabashi et al. |
May 1993 |
|
Non-Patent Literature Citations (4)
Entry |
Shafer et al., EDS, Readings in Uncertain Reasoning, Morgan Kaufmann, 1990, (Table of Contents). |
Ginsberg, E. D., Readings in Nonmonotonic Reasoning, Morgan Kaufmann, 1987, (Table of Contents). |
Ramsey, Formal Methods in Artificial Intelligence, Cambridge University Press, 1988, (selected pages). |
Delahaye, Formal Methods in Artificial Intelligence, John Wiley & Sons, 1987, (selected pages). |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
767258 |
Sep 1991 |
|