NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
We consider the role of constraints in maintaining both secrecy and integrity in a multilevel secure database. In a multilevel database, certain integrity and classification constraints create a secrecy problem since data additions, deletions or modifications require accessing data at higher levels. In many cases, however, these constraints may be approximated by a series of simpler constraints, called level-valid constraints. Level-valid constraints do not require access to any data that is classified higher than the data to be modified. Moreover, they meet the integrity requirements since any database state that satisfies the level-valid constraints also satisfies the multilevel constraints. Simple tests are developed to ensure the validity of proposed level-valid constraints and these constraints are derived for common cases of multilevel constraints.
Proceedings Title
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
Marks, D.
(1999),
Enforcing Integrity While Maintaining Secrecy, Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security , Seattle, WA
(Accessed October 16, 2025)