A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Transaction Processing Environment Kernelized Architecture in Multilevel Secure Application Policies
2018
International Journal of Advanced Research in Computer Science and Software Engineering
Multilevel security poses many challenging problems for transaction processing. ...
We identify these requirements on transaction processing in Multilevel Secure (MLS) database management systems (DBMSs) and survey the efforts of a number of researchers to meet these requirements .While ...
In the kernelized architecture, a multilevel database is partitioned into single-level databases, in which data at each security level is stored separately. ...
doi:10.23956/ijarcsse.v8i2.577
fatcat:woapvcnwozdgrg6d2mvxraa6wu
Architecture of Future Data Base Systems
1990
IEEE Data Engineering Bulletin
Transaction Processing 4. Query Optimization 5. ...
Advances in networking and database technology during the past decade have changed dramatically the information processing requirements of organizations and individuals. ...
Maria Zemankova, NSF Program Director of the Database and Expert Systems Program, recognized the substantial potential of this area and actively supported our efforts. ...
dblp:journals/debu/Stonebraker90
fatcat:wnywepen35fkjdvc4ac7oz5zoy
Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture
[chapter]
1994
Lecture Notes in Computer Science
We discuss the support of high-assurance write-up actions in multilevel secure object-oriented databases under the replicated architecture. ...
In this architecture, there exists a separate untrusted singlelevel database for each security level. ...
The solutions presented here increase the commercial viability of the replicated architecture as well as object-oriented databases, for applications and environments that require multilevel security. ...
doi:10.1007/3-540-58618-0_76
fatcat:3turrm66vrdrvjq7mh6llet6vq
TINA DPE Architecture, Version: 2.0b0
1997
Zenodo
It provides a general description of the TINA-DPE, and the functionalities required for a DPE that has to operate in a TINA environment. ...
This document describes the TINA Distributed Processing Environment (TINA-DPE). ...
Usually databases are the default solution, but from a user viewpoint, only the access to the information stored in the log is important. ...
doi:10.5281/zenodo.2683693
fatcat:ukvemnfme5fxlhljrkz4sc74ce
ColorSafe
2010
SIGARCH Computer Architecture News
In this paper, we propose ColorSafe, an architecture that detects and dynamically avoids single-and multi-variable atomicity violation bugs. ...
Our results show that, in deployment mode, ColorSafe is able to successfully avoid the majority of multivariable atomicity violations in bug kernels, as well as in large applications (Apache and MySQL) ...
This work was supported in part by NSF under grants CNS-0720593, a Microsoft Research Faculty Fellowship, and gifts from Microsoft Research and Intel. ...
doi:10.1145/1816038.1815988
fatcat:gmbbgdprzbfi3lgje3xdfvunkm
A proposed open cognitive architecture framework
2009
Proceedings of the 2009 Winter Simulation Conference (WSC)
This new cognitive architecture framework is combined with the Open Modeling and Simulation Architecture (OpenMSA) and the Open System Architecture for Modeling and Simulation (OSAMS) to form the foundation ...
The proposed cognitive architecture constructs described in this paper are designed to automatically provide scalable high performance execution on emerging multicore computers. ...
modeling wireless communications on supercomputers using the WarpIV Kernel for the Navy, Army, and Air Force. ...
doi:10.1109/wsc.2009.5429287
dblp:conf/wsc/SteinmanLV09
fatcat:usdn7xzfyvgf5asp2nqhinj7cm
Multilevel Secure Transaction Processing: Status and Prospects
[chapter]
1997
IFIP Advances in Information and Communication Technology
Since 1990, transaction processing in multilevel secure database management systems DBMSs has been receiving a great deal of attention from the database research community. ...
The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by m ultilevel security, and then describes the results ...
The work of Sushil Jajodia was partially supported by National Science Foundation under grants IRI-9303416 and IRI 9633541 and by National Security Agency under grants MDA904-96-1-0103 and MDA904-96-1- ...
doi:10.1007/978-0-387-35167-4_6
fatcat:nyo7e66qifgwfcikmmdvnbofhe
ColorSafe
2010
Proceedings of the 37th annual international symposium on Computer architecture - ISCA '10
In this paper, we propose ColorSafe, an architecture that detects and dynamically avoids single-and multi-variable atomicity violation bugs. ...
Our results show that, in deployment mode, ColorSafe is able to successfully avoid the majority of multivariable atomicity violations in bug kernels, as well as in large applications (Apache and MySQL) ...
This work was supported in part by NSF under grants CNS-0720593, a Microsoft Research Faculty Fellowship, and gifts from Microsoft Research and Intel. ...
doi:10.1145/1815961.1815988
dblp:conf/isca/LuciaCS10
fatcat:piw4d2pfqjdord5e7ecpejgapm
Guest Editorial Emerging Computing Offloading for IoTs: Architectures, Technologies, and Applications
2019
IEEE Internet of Things Journal
Special thanks are due to the Editor-in-Chief of the IEEE INTERNET OF THINGS JOURNAL, Dr. Xuemin Shen, for his help in the publication process. ...
We hope that the special issue can serve as a good reference for scientists, engineers, and academicians in the area of computation offloading in IoTs.
JIANNONG CAO ...
To study the application deployment with multilevel services (ADMS) problem, in "Resource Provisioning in the Edge for IoT Applications With Multilevel Services," the authors formulate the ADMS problem ...
doi:10.1109/jiot.2019.2921217
fatcat:yxc2v2whm5gtzhpefivtgt5uxy
Special Section Guest Editor's Introduction: Research Surveys On Building Systems With Knowledge And Data Engineering Techniques
1997
IEEE Transactions on Knowledge and Data Engineering
The final article in the special section is "Transaction Processing in Multilevel Secure Databases with Kernelized Architecture: Challenges and Solutions," by Vijayalakshmi Atluri, Sushil Jajodia, and ...
This article addresses the conflicting requirements of confidentiality, integrity, and availability as they relate to transactions processing in multilevel secure database systems. control techniques for ...
He is currently the surveys editor of IEEE Transactions on Knowledge and Data Engineering and chair of IFIP Working Group 11.3 on Database Security. ...
doi:10.1109/tkde.1997.634746
fatcat:jhs42j3ebzg7rpz62htnbuwf3i
D3.5 – ASSIST-IoT Architecture Definition – Initial
2021
Zenodo
Initial specification of the ASSIST-IoT technical architecture and its components. ...
Security enablers for ASSIST-IoT architecture ASSIST-IoT architecture will require a multilevel security monitoring solution that will need to adapt to different services and server instances in all the ...
In general, an NGIoT architecture like ASSIST-IoT's, requires a multilevel and multi-plane approach when it comes to security. ...
doi:10.5281/zenodo.6771349
fatcat:lhb7sv5v4bcqpfm6knceyv64om
An efficient multiversion algorithm for secure servicing of transaction reads
1994
Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94
We propose an efficient multiversion algorithm for servicing read requests in secure multilevel databases. ...
The algorithm avoids both covert channels and starvation of high transactions, and applies to security structures that are arbitrary partial orders. ...
Sushi1 Jajodia and Boris Kogan.Transaction processing in multilevel-secure databases using replicated architecture. ...
doi:10.1145/191177.191201
dblp:conf/ccs/AmmannJ94
fatcat:4xxjou6ngvdy5cmiou4edmu224
Digital government security infrastructure design challenges
2001
Computer
Acknowledgment This study is supported, in part, by a grant from the Center for Education and Research in Information Assurance and Security at Purdue. ...
, and applications, which can include database federations, multilevel secure database management systems, and multilevel secure operated systems. 7 Several security policies in a multidomain environment ...
Applications and services in a DG environment can require automated transactional functions and workflow-based processing, which result in a highly transaction-intensive infrastructure. Roshan K. ...
doi:10.1109/2.901169
fatcat:jrf2e6nrarbmpnwknthcvvcvsy
Implicit array bounds checking on 64-bit architectures
2006
ACM Transactions on Architecture and Code Optimization (TACO)
While this guarantee improves the correctness and security of arraybased code, it adds overhead to array references. ...
Our results show that when applying this infrastructure to high-performance computing programs written in Java, the overhead of bounds checking relative to a program with no bounds checks is reduced from ...
ACKNOWLEDGMENTS We wish to thank David Mosberger for answering several questions about the Itanium Linux design and implementation. ...
doi:10.1145/1187976.1187982
fatcat:zgalfefotrhbzg6e5d7p223zpq
DMARF AND GIPSY High Level Architecture and Requirements Analysis
[article]
2014
arXiv
pre-print
Besides, the respective test cases have been portrayed to ensure that there is not much behavioral change with the existing architecture. ...
In the current scenario, many organizations invest on open-source systems which are becoming popular and result in rapid growth, where in many of them have not met the quality standards which resulted ...
JDSF is a proposed framework for the security in the databases in Java. It mainly deals with the data security aspects like confidentiality, integrity, authentication and availability. ...
arXiv:1412.7528v1
fatcat:euagcptvlvdz3fwenc5jv7zc5e
« Previous
Showing results 1 — 15 out of 435 results