435 Hits in 8.7 sec

Transaction Processing Environment Kernelized Architecture in Multilevel Secure Application Policies

Jaychand Vishwakarma
2018 International Journal of Advanced Research in Computer Science and Software Engineering  
Multilevel security poses many challenging problems for transaction processing.  ...  We identify these requirements on transaction processing in Multilevel Secure (MLS) database management systems (DBMSs) and survey the efforts of a number of researchers to meet these requirements .While  ...  In the kernelized architecture, a multilevel database is partitioned into single-level databases, in which data at each security level is stored separately.  ... 
doi:10.23956/ijarcsse.v8i2.577 fatcat:woapvcnwozdgrg6d2mvxraa6wu

Architecture of Future Data Base Systems

Michael Stonebraker
1990 IEEE Data Engineering Bulletin  
Transaction Processing 4. Query Optimization 5.  ...  Advances in networking and database technology during the past decade have changed dramatically the information processing requirements of organizations and individuals.  ...  Maria Zemankova, NSF Program Director of the Database and Expert Systems Program, recognized the substantial potential of this area and actively supported our efforts.  ... 
dblp:journals/debu/Stonebraker90 fatcat:wnywepen35fkjdvc4ac7oz5zoy

Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture [chapter]

Roshan K. Thomas, Ravi S. Sandhu
1994 Lecture Notes in Computer Science  
We discuss the support of high-assurance write-up actions in multilevel secure object-oriented databases under the replicated architecture.  ...  In this architecture, there exists a separate untrusted singlelevel database for each security level.  ...  The solutions presented here increase the commercial viability of the replicated architecture as well as object-oriented databases, for applications and environments that require multilevel security.  ... 
doi:10.1007/3-540-58618-0_76 fatcat:3turrm66vrdrvjq7mh6llet6vq

TINA DPE Architecture, Version: 2.0b0

Anastasius Gavras, Wataru Takita
1997 Zenodo  
It provides a general description of the TINA-DPE, and the functionalities required for a DPE that has to operate in a TINA environment.  ...  This document describes the TINA Distributed Processing Environment (TINA-DPE).  ...  Usually databases are the default solution, but from a user viewpoint, only the access to the information stored in the log is important.  ... 
doi:10.5281/zenodo.2683693 fatcat:ukvemnfme5fxlhljrkz4sc74ce


Brandon Lucia, Luis Ceze, Karin Strauss
2010 SIGARCH Computer Architecture News  
In this paper, we propose ColorSafe, an architecture that detects and dynamically avoids single-and multi-variable atomicity violation bugs.  ...  Our results show that, in deployment mode, ColorSafe is able to successfully avoid the majority of multivariable atomicity violations in bug kernels, as well as in large applications (Apache and MySQL)  ...  This work was supported in part by NSF under grants CNS-0720593, a Microsoft Research Faculty Fellowship, and gifts from Microsoft Research and Intel.  ... 
doi:10.1145/1816038.1815988 fatcat:gmbbgdprzbfi3lgje3xdfvunkm

A proposed open cognitive architecture framework

Jeffrey S. Steinman, Craig N. Lammers, Maria E. Valinski
2009 Proceedings of the 2009 Winter Simulation Conference (WSC)  
This new cognitive architecture framework is combined with the Open Modeling and Simulation Architecture (OpenMSA) and the Open System Architecture for Modeling and Simulation (OSAMS) to form the foundation  ...  The proposed cognitive architecture constructs described in this paper are designed to automatically provide scalable high performance execution on emerging multicore computers.  ...  modeling wireless communications on supercomputers using the WarpIV Kernel for the Navy, Army, and Air Force.  ... 
doi:10.1109/wsc.2009.5429287 dblp:conf/wsc/SteinmanLV09 fatcat:usdn7xzfyvgf5asp2nqhinj7cm

Multilevel Secure Transaction Processing: Status and Prospects [chapter]

Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine McCollum, Ravi Mukkamala
1997 IFIP Advances in Information and Communication Technology  
Since 1990, transaction processing in multilevel secure database management systems DBMSs has been receiving a great deal of attention from the database research community.  ...  The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by m ultilevel security, and then describes the results  ...  The work of Sushil Jajodia was partially supported by National Science Foundation under grants IRI-9303416 and IRI 9633541 and by National Security Agency under grants MDA904-96-1-0103 and MDA904-96-1-  ... 
doi:10.1007/978-0-387-35167-4_6 fatcat:nyo7e66qifgwfcikmmdvnbofhe


Brandon Lucia, Luis Ceze, Karin Strauss
2010 Proceedings of the 37th annual international symposium on Computer architecture - ISCA '10  
In this paper, we propose ColorSafe, an architecture that detects and dynamically avoids single-and multi-variable atomicity violation bugs.  ...  Our results show that, in deployment mode, ColorSafe is able to successfully avoid the majority of multivariable atomicity violations in bug kernels, as well as in large applications (Apache and MySQL)  ...  This work was supported in part by NSF under grants CNS-0720593, a Microsoft Research Faculty Fellowship, and gifts from Microsoft Research and Intel.  ... 
doi:10.1145/1815961.1815988 dblp:conf/isca/LuciaCS10 fatcat:piw4d2pfqjdord5e7ecpejgapm

Guest Editorial Emerging Computing Offloading for IoTs: Architectures, Technologies, and Applications

Jiannong Cao, Deyu Zhang, Haibo Zhou, Peng-Jun Wan
2019 IEEE Internet of Things Journal  
Special thanks are due to the Editor-in-Chief of the IEEE INTERNET OF THINGS JOURNAL, Dr. Xuemin Shen, for his help in the publication process.  ...  We hope that the special issue can serve as a good reference for scientists, engineers, and academicians in the area of computation offloading in IoTs. JIANNONG CAO  ...  To study the application deployment with multilevel services (ADMS) problem, in "Resource Provisioning in the Edge for IoT Applications With Multilevel Services," the authors formulate the ADMS problem  ... 
doi:10.1109/jiot.2019.2921217 fatcat:yxc2v2whm5gtzhpefivtgt5uxy

Special Section Guest Editor's Introduction: Research Surveys On Building Systems With Knowledge And Data Engineering Techniques

D.L. Spooner
1997 IEEE Transactions on Knowledge and Data Engineering  
The final article in the special section is "Transaction Processing in Multilevel Secure Databases with Kernelized Architecture: Challenges and Solutions," by Vijayalakshmi Atluri, Sushil Jajodia, and  ...  This article addresses the conflicting requirements of confidentiality, integrity, and availability as they relate to transactions processing in multilevel secure database systems. control techniques for  ...  He is currently the surveys editor of IEEE Transactions on Knowledge and Data Engineering and chair of IFIP Working Group 11.3 on Database Security.  ... 
doi:10.1109/tkde.1997.634746 fatcat:jhs42j3ebzg7rpz62htnbuwf3i

D3.5 – ASSIST-IoT Architecture Definition – Initial

ASSIST-IoT Consortium
2021 Zenodo  
Initial specification of the ASSIST-IoT technical architecture and its components.  ...  Security enablers for ASSIST-IoT architecture ASSIST-IoT architecture will require a multilevel security monitoring solution that will need to adapt to different services and server instances in all the  ...  In general, an NGIoT architecture like ASSIST-IoT's, requires a multilevel and multi-plane approach when it comes to security.  ... 
doi:10.5281/zenodo.6771349 fatcat:lhb7sv5v4bcqpfm6knceyv64om

An efficient multiversion algorithm for secure servicing of transaction reads

Paul Ammann, Sushil Jajodia
1994 Proceedings of the 2nd ACM Conference on Computer and communications security - CCS '94  
We propose an efficient multiversion algorithm for servicing read requests in secure multilevel databases.  ...  The algorithm avoids both covert channels and starvation of high transactions, and applies to security structures that are arbitrary partial orders.  ...  Sushi1 Jajodia and Boris Kogan.Transaction processing in multilevel-secure databases using replicated architecture.  ... 
doi:10.1145/191177.191201 dblp:conf/ccs/AmmannJ94 fatcat:4xxjou6ngvdy5cmiou4edmu224

Digital government security infrastructure design challenges

J. Joshi, A. Ghafoor, W.G. Aref, E.H. Spafford
2001 Computer  
Acknowledgment This study is supported, in part, by a grant from the Center for Education and Research in Information Assurance and Security at Purdue.  ...  , and applications, which can include database federations, multilevel secure database management systems, and multilevel secure operated systems. 7 Several security policies in a multidomain environment  ...  Applications and services in a DG environment can require automated transactional functions and workflow-based processing, which result in a highly transaction-intensive infrastructure. Roshan K.  ... 
doi:10.1109/2.901169 fatcat:jrf2e6nrarbmpnwknthcvvcvsy

Implicit array bounds checking on 64-bit architectures

Chris Bentley, Scott A. Watterson, David K. Lowenthal, Barry Rountree
2006 ACM Transactions on Architecture and Code Optimization (TACO)  
While this guarantee improves the correctness and security of arraybased code, it adds overhead to array references.  ...  Our results show that when applying this infrastructure to high-performance computing programs written in Java, the overhead of bounds checking relative to a program with no bounds checks is reduced from  ...  ACKNOWLEDGMENTS We wish to thank David Mosberger for answering several questions about the Itanium Linux design and implementation.  ... 
doi:10.1145/1187976.1187982 fatcat:zgalfefotrhbzg6e5d7p223zpq

DMARF AND GIPSY High Level Architecture and Requirements Analysis [article]

Akhilesh Masna, Anil Ganesh, Prakash Tirunampalli, Sai Ganesh Gaddam, Katam Raju, Avinash Mandapaka, Bharath Reddy Gujjula, Iustin-Daniel Iacob
2014 arXiv   pre-print
Besides, the respective test cases have been portrayed to ensure that there is not much behavioral change with the existing architecture.  ...  In the current scenario, many organizations invest on open-source systems which are becoming popular and result in rapid growth, where in many of them have not met the quality standards which resulted  ...  JDSF is a proposed framework for the security in the databases in Java. It mainly deals with the data security aspects like confidentiality, integrity, authentication and availability.  ... 
arXiv:1412.7528v1 fatcat:euagcptvlvdz3fwenc5jv7zc5e
« Previous Showing results 1 — 15 out of 435 results