Filters








51,559 Hits in 3.7 sec

Analysis of locking policies in database management systems

D. Potier, Ph. Leblanc
1980 Communications of the ACM  
Analysis of locking policies in database management systems D. Potier, P. Leblanc. Analysis of locking policies in database management systems. [Research Report] RR-0023, INRIA. 1980.  ...  The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.  ... 
doi:10.1145/359015.359021 fatcat:45bsdidaeffhzpd7l6e53povam

Analysis of locking policies in database management systems

D. Potier, Ph. Leblanc
1980 Performance Evaluation Review  
Analysis of locking policies in database management systems D. Potier, P. Leblanc. Analysis of locking policies in database management systems. [Research Report] RR-0023, INRIA. 1980.  ...  The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.  ... 
doi:10.1145/1009375.806170 fatcat:nepsvbdjvbhglisix7jgdc7aqi

Analysis of locking policies in database management systems

D. Potier, Ph. Leblanc
1980 Proceedings of the 1980 international symposium on Computer performance modelling, measurement and evaluation - PERFORMANCE '80  
Analysis of locking policies in database management systems D. Potier, P. Leblanc. Analysis of locking policies in database management systems. [Research Report] RR-0023, INRIA. 1980.  ...  The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.  ... 
doi:10.1145/800199.806170 fatcat:g3qhmoanvbcnfmd44yej44ymky

Analysis of Various Attributes to Have a Secure Database

Harpreet Saini Harpreet Saini
2013 IOSR Journal of Computer Engineering  
Author will try to analyze which of the attribute is better than the other one among various categories of attributes in terms of system performance and user authentication.  ...  This paper provides an overview about how user, database administrator, system etc. affects the database security and also its performance.  ...  In the last section some security policies about system, data, user and password management are discussed.  ... 
doi:10.9790/0661-1058589 fatcat:ckwi7llpfjam7bdvqubczscdva

Towards Aspectual Component-Based Development of Real-Time Systems [chapter]

Aleksandra Tešanović, Dag Nyström, Jörgen Hansson, Christer Norström
2004 Lecture Notes in Computer Science  
Furthermore, using the COMET system as an example, we introduce a novel way of handling concurrency in a real-time database system, where concurrency is modeled as an aspect crosscutting the system.  ...  In this paper we introduce a novel concept of aspectual componentbased real-time system development.  ...  The application aspects could vary depending on the particular application of the real-time system, thus particular attention should be made to identify the application aspects for each real-time system  ... 
doi:10.1007/978-3-540-24686-2_35 fatcat:loo2xi7mqraa3hgxpzpydgctke

Improving timeliness in real-time secure database systems

Sang H. Son, Rasikan David, Bhavani Thuraisingham
1996 SIGMOD record  
The performance of the adaptive secure two-phase locking protocol shows improved timeliness. We also discuss future research direction to improve timeliness of secure database systems.  ...  Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  developed for each type of system. Trade-offs need to be made between security, timeliness and consistency on a case-by-case basis.  ... 
doi:10.1145/381854.381879 fatcat:s4ypzd2a7bhwbcy7wmcthq7zna

JPernLite

Jack J. Yang, Gail E. Kaiser
1998 Proceedings of the ninth ACM conference on Hypertext and hypermedia : links, objects, time and space---structure in hypermedia systems links, objects, time and space---structure in hypermedia systems - HYPERTEXT '98  
Most existing systems store data and links in specialized databases (link servers or hyperbases) with a built-in concurrency control policy, typically the conventional atomic/serializable transaction model  ...  Concurrency control is a well-known problem in design and implementation of multi-user hypermedia systems.  ...  External Transaction Manager Most traditional databases are constructed in such a way that the transaction manager is part of the database management system.  ... 
doi:10.1145/276627.276655 dblp:conf/ht/YangK98 fatcat:lfccfl3vj5dbjfu4j6gs2djncq

Design of LDV: a multilevel secure relational database management system

P.D. Stachour, B. Thuraisingham
1990 IEEE Transactions on Knowledge and Data Engineering  
In a multilevel secure database management system (MLS/ DBMS) users cleared at different security levels access and share a database consisting of data at a variety of sensitivity levels.  ...  Index Terms-Classification constraint, classification level, inference and aggregation, LDV, LOCK, multilevel secure relational database management system, pipelines, polyinstantiation, secure policy,  ...  .~ RADC,s support of the LDV application and their in-LDV: A multilevel secure relational database management system," Tech. Note, Honeywell Inc.. Dec. 1988.  ... 
doi:10.1109/69.54719 fatcat:p3epqjvjyffm3g7ur4t3gqp7eq

Concurrency Control and Recovery [chapter]

Michael Franklin
2014 Computing Handbook, Third Edition  
In contrast, a FORCE policy ensures that the committed updates are placed on non-volatile storage, so that in the event of a system crash, the updates will still be re ected in the copy of the database  ...  In practice, however, database management systems typically support concurrent execution, in which the operations of multiple transactions can be executed in an interleaved fashion.  ... 
doi:10.1201/b16768-15 fatcat:ihdir5rdebasvc7oaey7uy5exy

Performance Study of Shared-Nothing Parallel Transaction Processing Systems [chapter]

Jiahong Wang, Jie Li, Hisao Kameda
1998 Performance and Management of Complex Communication Networks  
In this paper, an analytic model is proposed for shared-nothing parallel TP systems with dynamic 2PL with the no-waiting policy.  ...  Processing transactions in parallel brings us a new challenge: how to study the performance behavior of parallel Transaction Processing (TP) systems with dynamic Two-Phase Locking (2PL) concurrency control  ...  The analysis of shared-nothing parallel TP systems is provided in sections 4 and 5. In sections 4 and 5 we also report simulation results to validate the analysis.  ... 
doi:10.1007/978-0-387-35360-9_9 fatcat:ghk27uspi5fntpmpakk6g5b5ee

Decision Tools for Reducing Congestion at Locks on the Upper Mississippi River

James Campbell, L. Smith, Donald Ii Sweeney, Ray Mundy, Robert Nauss
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
vessels in queues, and development of a prototype GIS-based vessel tracking system.  ...  This paper provides an overview of our research, including evaluation of lock and traffic management policies, development of a detailed multi-lock simulation model, evaluation of decision rules for sequencing  ...  However, our analysis of the actual operations as recorded in the Corps' OMNI database indicated that a modified form of this policy, denoted SINGPRIO, may better reflect current practice.  ... 
doi:10.1109/hicss.2007.164 dblp:conf/hicss/CampbellSSMN07 fatcat:7laikixot5anlmeev5dwevn7wi

SimDS

Alok R. Chaturvedi, Samir Gupta, Subhajyoti Bandyopadhyay
1998 ACM SIGMIS Database the DATABASE for Advances in Information Systems  
SimDS including various design policies that can be modeled by the system.  ...  It also discusses different design issues that one needs to consider in the implementation of a distributed simulation environment.  ...  Locking Policy In a central site system, the system assigns a lock site at the start of the simulation.  ... 
doi:10.1145/313310.313342 fatcat:bvhjjg4tbbfbrc3ueqskqhaq7i

Network and database security

Errol A. Blake
2007 Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07  
This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory  ...  This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted  ...  Mario Guimaraes for pouring their knowledge of Database Management Systems, Database Design and Implementation, and Database Security on me. Special thanks to Dr.  ... 
doi:10.1145/1409908.1409937 dblp:conf/infoseccd/Blake07 fatcat:cu7pw6t3zzgwhaw6kvtnj7cjnu

Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal

Errol Blake
2007 Journal of Digital Forensics, Security and Law  
This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory  ...  This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted  ...  Mario Guimaraes for pouring their knowledge of Database Management Systems, Database Design and Implementation, and Database Security on me. Special thanks to Dr.  ... 
doi:10.15394/jdfsl.2007.1033 fatcat:6wsfqlte2ratrg775anxri36ry

Efficient Algorithms and Performance Results for Multi-User Knowledge Bases

Vinay K. Chaudhri, John Mylopoulos
1995 International Joint Conference on Artificial Intelligence  
We present an algorithm, called the Dynamic Directed Graph policy, originally proposed in [Chaudhri et a/., 1992], which al lows efficient interleaved execution of transac tions against a large knowledge  ...  The implementation of the policy and exper imental evaluation results are also presented and discussed. The paper concludes with dis cussion on l essons learnt from this research.  ...  A compara ble requirement for databases is addressed by concur rency control mechanisms that are routinely offered by database management systems, which have been shown to improve throughput by as much  ... 
dblp:conf/ijcai/ChaudhriM95 fatcat:oltorx556zfmbepabqcghxxb6a
« Previous Showing results 1 — 15 out of 51,559 results