RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2014 Issue 7, Pages 99–101 (Mi pdma183)

This article is cited in 1 paper

Mathematical Foundations of Computer Security

Implementation of RDBMS MySQL security monitor in DBF/DAM systems

N. O. Tkachenko

Tomsk State University, Tomsk

Abstract: In this article, an information is given about the development of a prototype system implementing the mandatory access control and hiding database structure features for RDBMS MySQL on the basis of a formal DP-model, database firewall and database activity monitoring solutions. Proposed prototype is implemented in Lua as a module for MySQL-proxy utility. Each transition rule of the DP-model corresponds to implemented function in the code, and special functions are added to establish interaction between elements of the MySQL-proxy system and implemented rules of the formal model.

Keywords: computer security, access control implementation, DBF/DAM systems, RDBMS MySQL, MySQL-proxy.

UDC: 004.94



© Steklov Math. Inst. of RAS, 2024