A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Analysis of locking policies in database management systems
1980
Communications of the ACM
Analysis of locking policies in database management systems D. Potier, P. Leblanc. Analysis of locking policies in database management systems. [Research Report] RR-0023, INRIA. 1980. ...
The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. ...
doi:10.1145/359015.359021
fatcat:45bsdidaeffhzpd7l6e53povam
Analysis of locking policies in database management systems
1980
Performance Evaluation Review
Analysis of locking policies in database management systems D. Potier, P. Leblanc. Analysis of locking policies in database management systems. [Research Report] RR-0023, INRIA. 1980. ...
The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. ...
doi:10.1145/1009375.806170
fatcat:nepsvbdjvbhglisix7jgdc7aqi
Analysis of locking policies in database management systems
1980
Proceedings of the 1980 international symposium on Computer performance modelling, measurement and evaluation - PERFORMANCE '80
Analysis of locking policies in database management systems D. Potier, P. Leblanc. Analysis of locking policies in database management systems. [Research Report] RR-0023, INRIA. 1980. ...
The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. ...
doi:10.1145/800199.806170
fatcat:g3qhmoanvbcnfmd44yej44ymky
Analysis of Various Attributes to Have a Secure Database
2013
IOSR Journal of Computer Engineering
Author will try to analyze which of the attribute is better than the other one among various categories of attributes in terms of system performance and user authentication. ...
This paper provides an overview about how user, database administrator, system etc. affects the database security and also its performance. ...
In the last section some security policies about system, data, user and password management are discussed. ...
doi:10.9790/0661-1058589
fatcat:ckwi7llpfjam7bdvqubczscdva
Towards Aspectual Component-Based Development of Real-Time Systems
[chapter]
2004
Lecture Notes in Computer Science
Furthermore, using the COMET system as an example, we introduce a novel way of handling concurrency in a real-time database system, where concurrency is modeled as an aspect crosscutting the system. ...
In this paper we introduce a novel concept of aspectual componentbased real-time system development. ...
The application aspects could vary depending on the particular application of the real-time system, thus particular attention should be made to identify the application aspects for each real-time system ...
doi:10.1007/978-3-540-24686-2_35
fatcat:loo2xi7mqraa3hgxpzpydgctke
Improving timeliness in real-time secure database systems
1996
SIGMOD record
The performance of the adaptive secure two-phase locking protocol shows improved timeliness. We also discuss future research direction to improve timeliness of secure database systems. ...
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. ...
developed for each type of system. Trade-offs need to be made between security, timeliness and consistency on a case-by-case basis. ...
doi:10.1145/381854.381879
fatcat:s4ypzd2a7bhwbcy7wmcthq7zna
Most existing systems store data and links in specialized databases (link servers or hyperbases) with a built-in concurrency control policy, typically the conventional atomic/serializable transaction model ...
Concurrency control is a well-known problem in design and implementation of multi-user hypermedia systems. ...
External Transaction Manager Most traditional databases are constructed in such a way that the transaction manager is part of the database management system. ...
doi:10.1145/276627.276655
dblp:conf/ht/YangK98
fatcat:lfccfl3vj5dbjfu4j6gs2djncq
Design of LDV: a multilevel secure relational database management system
1990
IEEE Transactions on Knowledge and Data Engineering
In a multilevel secure database management system (MLS/ DBMS) users cleared at different security levels access and share a database consisting of data at a variety of sensitivity levels. ...
Index Terms-Classification constraint, classification level, inference and aggregation, LDV, LOCK, multilevel secure relational database management system, pipelines, polyinstantiation, secure policy, ...
.~ RADC,s support of the LDV application and their in-LDV: A multilevel secure relational database management system," Tech. Note, Honeywell Inc.. Dec. 1988. ...
doi:10.1109/69.54719
fatcat:p3epqjvjyffm3g7ur4t3gqp7eq
Concurrency Control and Recovery
[chapter]
2014
Computing Handbook, Third Edition
In contrast, a FORCE policy ensures that the committed updates are placed on non-volatile storage, so that in the event of a system crash, the updates will still be re ected in the copy of the database ...
In practice, however, database management systems typically support concurrent execution, in which the operations of multiple transactions can be executed in an interleaved fashion. ...
doi:10.1201/b16768-15
fatcat:ihdir5rdebasvc7oaey7uy5exy
Performance Study of Shared-Nothing Parallel Transaction Processing Systems
[chapter]
1998
Performance and Management of Complex Communication Networks
In this paper, an analytic model is proposed for shared-nothing parallel TP systems with dynamic 2PL with the no-waiting policy. ...
Processing transactions in parallel brings us a new challenge: how to study the performance behavior of parallel Transaction Processing (TP) systems with dynamic Two-Phase Locking (2PL) concurrency control ...
The analysis of shared-nothing parallel TP systems is provided in sections 4 and 5. In sections 4 and 5 we also report simulation results to validate the analysis. ...
doi:10.1007/978-0-387-35360-9_9
fatcat:ghk27uspi5fntpmpakk6g5b5ee
Decision Tools for Reducing Congestion at Locks on the Upper Mississippi River
2007
2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)
vessels in queues, and development of a prototype GIS-based vessel tracking system. ...
This paper provides an overview of our research, including evaluation of lock and traffic management policies, development of a detailed multi-lock simulation model, evaluation of decision rules for sequencing ...
However, our analysis of the actual operations as recorded in the Corps' OMNI database indicated that a modified form of this policy, denoted SINGPRIO, may better reflect current practice. ...
doi:10.1109/hicss.2007.164
dblp:conf/hicss/CampbellSSMN07
fatcat:7laikixot5anlmeev5dwevn7wi
SimDS including various design policies that can be modeled by the system. ...
It also discusses different design issues that one needs to consider in the implementation of a distributed simulation environment. ...
Locking Policy In a central site system, the system assigns a lock site at the start of the simulation. ...
doi:10.1145/313310.313342
fatcat:bvhjjg4tbbfbrc3ueqskqhaq7i
Network and database security
2007
Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07
This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory ...
This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted ...
Mario Guimaraes for pouring their knowledge of Database Management Systems, Database Design and Implementation, and Database Security on me. Special thanks to Dr. ...
doi:10.1145/1409908.1409937
dblp:conf/infoseccd/Blake07
fatcat:cu7pw6t3zzgwhaw6kvtnj7cjnu
Network and Database Security: Regulatory Compliance, Network, and Database Security - A Unified Process and Goal
2007
Journal of Digital Forensics, Security and Law
This paper will take the approach that if one make a conscientious effort to unifying the Database Security process, which includes Database Management System (DBMS) selection process, following regulatory ...
This paper is a compilation of different journals, articles and classroom discussions will focus on unifying the process of securing data or information whether it is in use, in storage or being transmitted ...
Mario Guimaraes for pouring their knowledge of Database Management Systems, Database Design and Implementation, and Database Security on me. Special thanks to Dr. ...
doi:10.15394/jdfsl.2007.1033
fatcat:6wsfqlte2ratrg775anxri36ry
Efficient Algorithms and Performance Results for Multi-User Knowledge Bases
1995
International Joint Conference on Artificial Intelligence
We present an algorithm, called the Dynamic Directed Graph policy, originally proposed in [Chaudhri et a/., 1992], which al lows efficient interleaved execution of transac tions against a large knowledge ...
The implementation of the policy and exper imental evaluation results are also presented and discussed. The paper concludes with dis cussion on l essons learnt from this research. ...
A compara ble requirement for databases is addressed by concur rency control mechanisms that are routinely offered by database management systems, which have been shown to improve throughput by as much ...
dblp:conf/ijcai/ChaudhriM95
fatcat:oltorx556zfmbepabqcghxxb6a
« Previous
Showing results 1 — 15 out of 51,559 results