Filters








40 Hits in 7.2 sec

Concurrency Control for Multilevel Secure Databases

Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje
2009 International Journal of Network Security  
The concurrency control requirements for transaction processing in multilevel secure database management systems (MLS/DBMSs) are different from those in conventional transaction processing systems.  ...  A multilevel secure (MLS) database is intended to protect classified information from unauthorized users based on the classification of the data and the clearances of the users.  ...  Concurrency Control Protocols for MLS/DBSs Concurrency control is important for MLS/DBs because a covert channel can be easily created through collaboration of multilevel secure transactions in most traditional  ... 
dblp:journals/ijnsec/KaurSMS09 fatcat:ejaivhtckzgptcyxa73samowlq

Improving timeliness in real-time secure database systems

Sang H. Son, Rasikan David, Bhavani Thuraisingham
1996 SIGMOD record  
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  Database systems for real-time applications must satisfy timing constraints associated with transactions, while maintaining data consistency.  ...  developed for each type of system. Trade-offs need to be made between security, timeliness and consistency on a case-by-case basis.  ... 
doi:10.1145/381854.381879 fatcat:s4ypzd2a7bhwbcy7wmcthq7zna

Maintaining security and timeliness in real-time database system

Quazi N. Ahmed, Susan V. Vrbsky
2002 Journal of Systems and Software  
We present two concurrency control algorithms for secure real-time databases: the Secure 2PLHP algorithm is based on a two-phase locking protocol and the Secure OPT algorithm uses the properties of an  ...  optimistic concurrency protocol.  ...  used to evaluate the performance of our concurrency control algorithms for real-time database systems.  ... 
doi:10.1016/s0164-1212(01)00111-x fatcat:djoj27yjuffb3bt2plfeb24apm

Survey on Database Concurrency Control in Multilevel Secure Database Management Systems

Sakil Ahmad Ansari, Jaychand Vishwakarma
2018 International Journal of Advanced Research in Computer Science and Software Engineering  
We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data.  ...  Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure.  ...  We have shown how a scheduler can affect security and introduced the concept of DC-Security, which implies a system is free of covert channels due to contention for access to data.  ... 
doi:10.23956/ijarcsse.v8i4.645 fatcat:f3r6vqujfvgg3ko3yavcsyz7vq

Maintaining integrity constraints and security in real-time database systems [chapter]

Q. N. Ahmed, S. V. Vrbsky
1998 Integrity and Internal Control in Information Systems  
We propose a new concurrency control algorithm for secure real-time databases. We implement the algorithm and study the performance using a real-time database system simulation model.  ...  In addition to such security constraints, real-time database systems have real-time integrity constraints.  ...  They examine the performance of such strategies as a two-phase locking priority scheme, a prioritized optimistic concurrency control algorithm and a new approach, called the dual approach.  ... 
doi:10.1007/978-0-387-35396-8_13 fatcat:57jvraefqzaq3kwgwqycauuhwu

Multilevel Secure Transaction Processing: Status and Prospects [chapter]

Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine McCollum, Ravi Mukkamala
1997 IFIP Advances in Information and Communication Technology  
Since 1990, transaction processing in multilevel secure database management systems DBMSs has been receiving a great deal of attention from the database research community.  ...  Research results and limitations in concurrency control, multilevel transaction management, and secure commit protocols are summarized.  ...  The work of Thomas Keefe was partially supported by National Security Agency under grant M D A904-94-C-612. The work of Catherine McCollum was partially supported by U.S.  ... 
doi:10.1007/978-0-387-35167-4_6 fatcat:nyo7e66qifgwfcikmmdvnbofhe

A secure concurrency control protocol for real-time databases [chapter]

Ravi Mukkamala, Sang H. Son
1996 IFIP Advances in Information and Communication Technology  
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditions using a primary copy and a secondary copy for each data object.  ...  CONCLUSION In this paper, we proposed a novel concurrency control protocol for multilevel secure realtime database systems.  ... 
doi:10.1007/978-0-387-34932-9_14 fatcat:parsmxn3ubajvoezi7z3dhkvx4

Integrating security and real-time requirements using covert channel capacity

S.H. Son, R. Mukkamala, R. David
2000 IEEE Transactions on Knowledge and Data Engineering  
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  Analytical expressions for the mutual information of the resultant covert channel are derived and a feedback control scheme is proposed that does not allow the mutual information to exceed a specified  ...  CORRECTNESS CRITERIA FOR SECURE SCHEDULERS Covert channel analysis and removal is one of the most important issues in multilevel secure concurrency control.  ... 
doi:10.1109/69.895799 fatcat:xoc5zkxsnjeu5hkfqooip2bfyy

Secure Locking Protocols for Multilevel Database Management Systems [chapter]

Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
1997 IFIP Advances in Information and Communication Technology  
While there are several secure concurrency control protocols for multilevel database management systems, most of them employ timestamp ordering or multiple versions of data or a hybrid protocol that utilizes  ...  (eds.), Database Security © IFIP International Federation for Information Processing 1997 Part Six Multilevel Databases  ...  INTRODUCTION The problem of secure concurrency control makes transaction management in multilevel secure (MLS) database systems more complex than in traditional databases.  ... 
doi:10.1007/978-0-387-35167-4_11 fatcat:6ltp7rvngvfzzmgz7xfxa5tave

An Adaptive Policy for Improved Timeliness in Secure Database Systems [chapter]

Sang H. Son, Rasikan David, Bhavani Thuraisingham
1996 IFIP Advances in Information and Communication Technology  
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency.  ...  BACKGROUND Correctness Criteria for Secure Scheduler Covert channel analysis and removal is one of the most important issues in multilevel secure concurrency control.  ... 
doi:10.1007/978-0-387-34932-9_13 fatcat:ocyf4zj3tjbwzdwdah2xvd4ql4

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication.  ...  The concept of`distress cash' is introduced that uses a covert channel to mark cash released under threat.  ...  ' K Lee, S Park, IICIS 97 pp 131 151 A transaction model supporting global integrity constraints in multidatabase systems is presented, together with the optimistic concurrency control to serialise both  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

Maintaining security in firm real-time database systems

Q.N. Ahmed, S.V. Vrbsky
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)  
We propose a new optimistic concurrency control algorithm for secure firm real-time databases.  ...  Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information, where mandatory access control for security  ...  Secure real-time factor The concurrency control algorithm for a secure realtime database system must use security levels of transactions as well as their deadlines to resolve data conflicts.  ... 
doi:10.1109/csac.1998.738584 dblp:conf/acsac/AhmedV98 fatcat:dgrvphvv4rbcnoitlto6ungpbq

Supporting security requirements in multilevel real-time databases

R. David, S.H. Son, R. Mukkamala
Proceedings 1995 IEEE Symposium on Security and Privacy  
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  The capacity of the resultant covert channel is derived and a feedback control scheme is proposed that does not allow the capacity to exceed a speci ed upper bound.  ...  Acknowledgements This work was supported in part by NASA LaRC, ONR, VCIT, and Loral Federal Systems.  ... 
doi:10.1109/secpri.1995.398933 dblp:conf/sp/DavidSM95 fatcat:q46kj3dai5bvho3dplyvsu2cxe

STAR: secure real-time transaction processing with timeliness guarantees

Kyoung-Don Kang, S.H. Son, J.A. Stankovic
23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002.  
In this paper, we present a novel real-time database architecture, in which illegal direct/indirect inter-level information flows are prevented while controlling the deadline miss ratio for admitted transactions  ...  QoS management, admission control, and feedback control schemes are applied to support certain guarantees on miss ratio against potential overload and data conflicts.  ...  The main objective of this back-off scheme is to prevent a potential miss ratio overshoot in real-time databases because of an overly optimistic utilization threshold.  ... 
doi:10.1109/real.2002.1181584 dblp:conf/rtss/KangSS02 fatcat:mec2x4tpwnewfghuxmuj2uefla

China's Conception of Cyber Sovereignty: Rhetoric and Realization

Rogier Creemers
2020 Social Science Research Network  
a reviewer who may quote passages in a review.  ...  No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without written permission from the publisher, except by  ...  In 2007, the Ministry of Public Security introduced the first iteration of the multilevel protection system (MLPS) for cybersecurity.  ... 
doi:10.2139/ssrn.3532421 fatcat:mauajbbhzrak5jruw4uz2ixgoa
« Previous Showing results 1 — 15 out of 40 results