Database Reference
In-Depth Information
C i = L(user)
K = K Ci
Set i = 1
t i = D (K, E (K, t i ))
t i [TC] ≤ L(user)
No
Ye s
i = i + 1
Set j = 1
t i [A j ] ∈ [A i ]*
j = j + 1
Ye s
No
t[A j ] = E (K, t i [A j ])
t[A j ] = null
t[PK] = t´[PK] and
t[TC] = t´[TC]
Ye s
No
Tuple t´ will be
replaced by t
Tuple t will be
inserted
End
Figure 5.5 Flow chart for the uplevel operation in the encryption-based multilevel database
model. (R. Haraty and N. Bekaii. 2006. Journal of Computer Science 2 (1): 19-28.)
 
Search WWH ::




Custom Search