A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Concurrency Control for Multilevel Secure Databases
2009
International Journal of Network Security
The concurrency control requirements for transaction processing in multilevel secure database management systems (MLS/DBMSs) are different from those in conventional transaction processing systems. ...
A multilevel secure (MLS) database is intended to protect classified information from unauthorized users based on the classification of the data and the clearances of the users. ...
Concurrency Control Protocols for MLS/DBSs Concurrency control is important for MLS/DBs because a covert channel can be easily created through collaboration of multilevel secure transactions in most traditional ...
dblp:journals/ijnsec/KaurSMS09
fatcat:ejaivhtckzgptcyxa73samowlq
Improving timeliness in real-time secure database systems
1996
SIGMOD record
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. ...
Database systems for real-time applications must satisfy timing constraints associated with transactions, while maintaining data consistency. ...
developed for each type of system. Trade-offs need to be made between security, timeliness and consistency on a case-by-case basis. ...
doi:10.1145/381854.381879
fatcat:s4ypzd2a7bhwbcy7wmcthq7zna
Maintaining security and timeliness in real-time database system
2002
Journal of Systems and Software
We present two concurrency control algorithms for secure real-time databases: the Secure 2PLHP algorithm is based on a two-phase locking protocol and the Secure OPT algorithm uses the properties of an ...
optimistic concurrency protocol. ...
used to evaluate the performance of our concurrency control algorithms for real-time database systems. ...
doi:10.1016/s0164-1212(01)00111-x
fatcat:djoj27yjuffb3bt2plfeb24apm
Survey on Database Concurrency Control in Multilevel Secure Database Management Systems
2018
International Journal of Advanced Research in Computer Science and Software Engineering
We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. ...
Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. ...
We have shown how a scheduler can affect security and introduced the concept of DC-Security, which implies a system is free of covert channels due to contention for access to data. ...
doi:10.23956/ijarcsse.v8i4.645
fatcat:f3r6vqujfvgg3ko3yavcsyz7vq
Maintaining integrity constraints and security in real-time database systems
[chapter]
1998
Integrity and Internal Control in Information Systems
We propose a new concurrency control algorithm for secure real-time databases. We implement the algorithm and study the performance using a real-time database system simulation model. ...
In addition to such security constraints, real-time database systems have real-time integrity constraints. ...
They examine the performance of such strategies as a two-phase locking priority scheme, a prioritized optimistic concurrency control algorithm and a new approach, called the dual approach. ...
doi:10.1007/978-0-387-35396-8_13
fatcat:57jvraefqzaq3kwgwqycauuhwu
Multilevel Secure Transaction Processing: Status and Prospects
[chapter]
1997
IFIP Advances in Information and Communication Technology
Since 1990, transaction processing in multilevel secure database management systems DBMSs has been receiving a great deal of attention from the database research community. ...
Research results and limitations in concurrency control, multilevel transaction management, and secure commit protocols are summarized. ...
The work of Thomas Keefe was partially supported by National Security Agency under grant M D A904-94-C-612. The work of Catherine McCollum was partially supported by U.S. ...
doi:10.1007/978-0-387-35167-4_6
fatcat:nyo7e66qifgwfcikmmdvnbofhe
A secure concurrency control protocol for real-time databases
[chapter]
1996
IFIP Advances in Information and Communication Technology
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. ...
In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditions using a primary copy and a secondary copy for each data object. ...
CONCLUSION In this paper, we proposed a novel concurrency control protocol for multilevel secure realtime database systems. ...
doi:10.1007/978-0-387-34932-9_14
fatcat:parsmxn3ubajvoezi7z3dhkvx4
Integrating security and real-time requirements using covert channel capacity
2000
IEEE Transactions on Knowledge and Data Engineering
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. ...
Analytical expressions for the mutual information of the resultant covert channel are derived and a feedback control scheme is proposed that does not allow the mutual information to exceed a specified ...
CORRECTNESS CRITERIA FOR SECURE SCHEDULERS Covert channel analysis and removal is one of the most important issues in multilevel secure concurrency control. ...
doi:10.1109/69.895799
fatcat:xoc5zkxsnjeu5hkfqooip2bfyy
Secure Locking Protocols for Multilevel Database Management Systems
[chapter]
1997
IFIP Advances in Information and Communication Technology
While there are several secure concurrency control protocols for multilevel database management systems, most of them employ timestamp ordering or multiple versions of data or a hybrid protocol that utilizes ...
(eds.), Database Security © IFIP International Federation for Information Processing 1997 Part Six Multilevel Databases ...
INTRODUCTION The problem of secure concurrency control makes transaction management in multilevel secure (MLS) database systems more complex than in traditional databases. ...
doi:10.1007/978-0-387-35167-4_11
fatcat:6ltp7rvngvfzzmgz7xfxa5tave
An Adaptive Policy for Improved Timeliness in Secure Database Systems
[chapter]
1996
IFIP Advances in Information and Communication Technology
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. ...
Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. ...
BACKGROUND
Correctness Criteria for Secure Scheduler Covert channel analysis and removal is one of the most important issues in multilevel secure concurrency control. ...
doi:10.1007/978-0-387-34932-9_13
fatcat:ocyf4zj3tjbwzdwdah2xvd4ql4
MRD Hashing
[chapter]
1998
Lecture Notes in Computer Science
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication. ...
The concept of`distress cash' is introduced that uses a covert channel to mark cash released under threat. ...
' K Lee, S Park, IICIS 97 pp 131 151 A transaction model supporting global integrity constraints in multidatabase systems is presented, together with the optimistic concurrency control to serialise both ...
doi:10.1007/3-540-69710-1_10
fatcat:mezaspbmk5c4nhu227gayoeejq
Maintaining security in firm real-time database systems
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
We propose a new optimistic concurrency control algorithm for secure firm real-time databases. ...
Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information, where mandatory access control for security ...
Secure real-time factor The concurrency control algorithm for a secure realtime database system must use security levels of transactions as well as their deadlines to resolve data conflicts. ...
doi:10.1109/csac.1998.738584
dblp:conf/acsac/AhmedV98
fatcat:dgrvphvv4rbcnoitlto6ungpbq
Supporting security requirements in multilevel real-time databases
Proceedings 1995 IEEE Symposium on Security and Privacy
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. ...
The capacity of the resultant covert channel is derived and a feedback control scheme is proposed that does not allow the capacity to exceed a speci ed upper bound. ...
Acknowledgements This work was supported in part by NASA LaRC, ONR, VCIT, and Loral Federal Systems. ...
doi:10.1109/secpri.1995.398933
dblp:conf/sp/DavidSM95
fatcat:q46kj3dai5bvho3dplyvsu2cxe
STAR: secure real-time transaction processing with timeliness guarantees
23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002.
In this paper, we present a novel real-time database architecture, in which illegal direct/indirect inter-level information flows are prevented while controlling the deadline miss ratio for admitted transactions ...
QoS management, admission control, and feedback control schemes are applied to support certain guarantees on miss ratio against potential overload and data conflicts. ...
The main objective of this back-off scheme is to prevent a potential miss ratio overshoot in real-time databases because of an overly optimistic utilization threshold. ...
doi:10.1109/real.2002.1181584
dblp:conf/rtss/KangSS02
fatcat:mec2x4tpwnewfghuxmuj2uefla
China's Conception of Cyber Sovereignty: Rhetoric and Realization
2020
Social Science Research Network
a reviewer who may quote passages in a review. ...
No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by ...
In 2007, the Ministry of Public Security introduced the first iteration of the multilevel protection system (MLPS) for cybersecurity. ...
doi:10.2139/ssrn.3532421
fatcat:mauajbbhzrak5jruw4uz2ixgoa
« Previous
Showing results 1 — 15 out of 40 results