Filters








299,980 Hits in 4.1 sec

Secure transaction processing in firm real-time database systems

Binto George, Jayant Haritsa
1997 Proceedings of the 1997 ACM SIGMOD international conference on Management of data - SIGMOD '97  
A secure real-time (till ill)ilSC' svst,niii hits to simultaneously satisfy two require-III(YII.~ guarant,ee data security and minimize the number 111' ttlihs(s(l transnc.t,ion deadlines.  ...  for guaranteeing Y(Y III'II v ,III(I for improving real-time performance.  ...  Our simulation model captures a real-time database system with an open transaction arrival process.  ... 
doi:10.1145/253260.253362 dblp:conf/sigmod/GeorgeH97 fatcat:3oeqenfrr5bejf73wua5ddryne

Secure Concurrency Control in Firm Real-Time Database Systems [chapter]

Binto George, Jayant R. Haritsa
2000 Security of Data and Transaction Processing  
Although real-time transaction concurrency control has been extensively studied, the design and evaluation of real-time in&l: concurrency control algorithms has not yet been considered.  ...  in a conventional (non-real-time) database system.  ...  Introduction A real-time database system (RTDBS) is a transaction processing system that is designed to handle workloads where transactions have completion deadlines.  ... 
doi:10.1007/978-1-4615-4461-6_3 fatcat:2sawifrqebdl5mn5xmb4no272m

STAR: secure real-time transaction processing with timeliness guarantees

Kyoung-Don Kang, S.H. Son, J.A. Stankovic
23rd IEEE Real-Time Systems Symposium, 2002. RTSS 2002.  
Real-time databases are needed in security-critical applications, e.g., e-commerce, agile manufacturing, and military applications.  ...  It is essential for real-time databases to prevent illegal direct/indirect transfer of sensitive data, e.g., secret trade, manufacturing, or operational data, between transactions belonging to different  ...  Our contribution might increase as the demand for secure real-time transaction processing increases.  ... 
doi:10.1109/real.2002.1181584 dblp:conf/rtss/KangSS02 fatcat:mec2x4tpwnewfghuxmuj2uefla

Supporting the requirements for multi-level secure and real-time databases in distributed environments [chapter]

Sang H. Son, Craig Chaney
1998 IFIP Advances in Information and Communication Technology  
Conflicts in database systems with both real-time and security requirements can sometimes be unresolvable.  ...  We attack this problem by allowing a database to have partial security in order to improve on real-time performance when necessary.  ...  Supporting Real-time and Partial Security in BeeHive Along with the security and real-time requests of the transactions, the mapper conveys the identity of the transaction and its timestamp to each of  ... 
doi:10.1007/978-0-387-35285-5_5 fatcat:uwnjcebkabhgdo7xfg6dtmnmya

Misconceptions about real-time databases

J.A. Stankovic, Sang Hyuk Son, J. Hansson
1999 Computer  
For example, if a transaction uses temperature and pressure data to make a decision regarding a chemical process, these two data values must correlate closely in time or the computation will likely make  ...  In a real-time database system, timing constraints are associated with transactions, and data are valid for specific time intervals. 2, 3 The transaction timing constraints can be completion deadlines,  ...  This can cause problems in a real-time database system because the increased processing time due to transaction restarts can make the transaction late and can jeopardize the timeliness of other transactions  ... 
doi:10.1109/2.769440 fatcat:fgewots6vve5lhsvjqb55xcoxm

Touch-and-Go Mobile Payment System

Peter Rulić, Bojan Kotnik, Saša Klampfer, Amor Chowdhury
2017 Journal of Transportation Technologies  
Defined processing model was implemented on real public transportation mobile payment system where it was proven as a robust solution for execution of small value touch-and-go mobile ticketing transactions  ...  This paper describes a holistic transaction processing model for resolving mentioned problems in micropayment mobile touch-and-go transaction systems.  ...  To achieve near real-time synchronizations, we have chosen the approach, where transactions are processed near real-time or just after they are transferred to the central processing system.  ... 
doi:10.4236/jtts.2017.71004 fatcat:5mifegigrbg4pjz6rn4diox7lu

A Traceable and Reliable Electronic Supply Chain System Based on Blockchain Technology

Shaniar Tahir Mohammed, Jamal Ali Hussien
2020 UHD Journal of Science and Technology  
Blockchain (BC) technology is a decentralized network that records all the transactions in real-time and is used in many areas such as cryptocurrency.  ...  The results illustrate that the proposed approach protects the drugs from counterfeiting, ensures the reliability, and provides a real-time tracking system for the transactions that have occurred among  ...  In ESC systems, the information can be stored electronically with a centralized system without real-time recording of the process, which is not secure.  ... 
doi:10.21928/uhdjst.v4n2y2020.pp132-140 fatcat:r44vsdl4lrcb5ltctbiklwa6ei

Multilevel Secure Data Stream Processing [chapter]

Raman Adaikkalavan, Indrakshi Ray, Xing Xie
2011 Lecture Notes in Computer Science  
actions in real-time.  ...  Data Stream Management Systems (DSMSs) have been proposed to address the data processing needs of such applications that require collection of high-speed data, computing results on-the-fly, and taking  ...  Scheduling strategy in MLS real-time transaction processing must address security, serialization and transaction deadlines, whereas scheduling in CQ must address security and query response time and throughput  ... 
doi:10.1007/978-3-642-22348-8_11 fatcat:ipt54syvzrdsheveqdekyttodi

Improving timeliness in real-time secure database systems

Sang H. Son, Rasikan David, Bhavani Thuraisingham
1996 SIGMOD record  
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  Database systems for real-time applications must satisfy timing constraints associated with transactions, while maintaining data consistency.  ...  Trade-offs need to be made between security, timeliness and consistency on a case-by-case basis.  ... 
doi:10.1145/381854.381879 fatcat:s4ypzd2a7bhwbcy7wmcthq7zna

Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis

Roland Rieke, Maria Zhdanova, Jurgen Repp, Romain Giot, Chrystel Gaber
2013 2013 International Conference on Availability, Reliability and Security  
Specifically, we apply a tool for predictive security analysis at runtime which observes process behavior with respect to transactions within a money transfer service and tries to match it with expected  ...  The goal of the experiments is to detect misuse patterns reflecting a given money laundering scheme in synthetic process behavior based on properties captured from real world transaction events.  ...  The PSA takes as an input real-time events from the process execution environment, a process model and its security requirements.  ... 
doi:10.1109/ares.2013.87 dblp:conf/IEEEares/RiekeZRGG13 fatcat:b24hk7jznvbmrlpe5dyp37j56u

Information survivability for evolvable and adaptable real-time command and control systems

B.M. Thuraisingham, J.A. Maurer
1999 IEEE Transactions on Knowledge and Data Engineering  
MITRE's Evolvable Real-Time C3 (Command, Control, and Communications) project has developed an approach that would enable current real-time systems to evolve into the systems of the future.  ...  Then, a detailed discussion of the infrastructure requirements for a survivable real-time C3 system is presented.  ...  This will mean determining trade-offs between real-time processing and security processing.  ... 
doi:10.1109/69.755631 fatcat:4cbtzqw2szajndcojvjsfd35za

Beehive: Global Multimedia Database Support for Dependable, Real-Time Applications [chapter]

John Stankovic, Sang Son, Jörg Liebeherr
1997 Real-Time Database and Information Systems: Research Advances  
tolerance, support for real-time databases and security, and the special features that deal with crisis mode operation.  ...  We are developing a global virtual database, called BeeHive, which is enterprise speci c and o ers features along real-time, fault tolerance, quality of service for audio and video, and security dimensions  ...  synergistically operate with the transaction properties of databases and with real-time logging and recovery, a new architecture and model of interaction between multimedia and transaction processing,  ... 
doi:10.1007/978-1-4615-6069-2_22 fatcat:5jtweeqvhzeplpq4mxjzuu5oai

Data Outsourcing based on Secure Association Rule Mining Processes

V. Sujatha, Debnath Bhattacharyya, P. Silpa Chaitanya, Tai-hoon Kim
2015 International Journal of Security and Its Applications  
The result shows that algorithm timing is desirable for big size data for security considerations using association rule mining operations in real time application development.  ...  A secure frequency developed algorithm is used for doing above process efficiently in partitioned data, which includes services of the data in outsourcing process.  ...  This protocol increases efficiency in providing security in real time application development processes.  ... 
doi:10.14257/ijsia.2015.9.3.05 fatcat:gx2pvzxulndgtausfuuey27g2m

A secure concurrency control protocol for real-time databases [chapter]

Ravi Mukkamala, Sang H. Son
1996 IFIP Advances in Information and Communication Technology  
Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems.  ...  Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency.  ...  A real-time database management system (RTDBMS) is a transaction processing system where transactions have explicit timing constraints.  ... 
doi:10.1007/978-0-387-34932-9_14 fatcat:parsmxn3ubajvoezi7z3dhkvx4

BeeHive: Global Multimedia Database Support for Dependable, Real-Time Applications [chapter]

John A. Stankovic, Sang H. Son, Jörg Liebeherr
1998 Lecture Notes in Computer Science  
tolerance, support for real-time databases and security, and the special features that deal with crisis mode operation.  ...  We are developing a global virtual database, called BeeHive, which is enterprise speci c and o ers features along real-time, fault tolerance, quality of service for audio and video, and security dimensions  ...  synergistically operate with the transaction properties of databases and with real-time logging and recovery, a new architecture and model of interaction between multimedia and transaction processing,  ... 
doi:10.1007/3-540-49151-1_4 fatcat:fc7mldcl6fes3j7gfkay7hbqie
« Previous Showing results 1 — 15 out of 299,980 results