Transaction Scheduling in Multi-Level Secure Database Systems
نویسندگان
چکیده
Trunsuctions are vitu1 .for multi-level secure dutubase munugement systems(MLSh7BMSs) because concurrent e.recution of trunsuctions potentiullv has conflicrs among their uccessing to shured ciutu. Wlea conflict occurs, only one trunsuction i,c. grunted to u c ~ e s s the shared data, olhrr transactions should be delayed until they can sufely use the datu. ‘T7m.w conjlicts may leud to the security problems in MLS/L)BMS. conspi rutors produce those conflicts intentionullv, they can establish the unexpectpd comm.unicafion path ccnll~d covert chunnel between high security level users and !ow set:uriI?, level usem This paper proposes U trunsuction scheduling scheme culled Conflict-lnsen,vible Scheduling (C1,V) lhat hdes conflicts from low security lwei trunsuctions to prevent thc covtv?
منابع مشابه
Verified Order-Based Transaction Scheduling Scheme for Multilevel Secure Database Management Systems
While the secure transaction schedulers in multilevel secure database systems synchronize transactions cleared at different security levels, they must consider the problem of covert channel. Through the covert channel, malicious users leak secret information in a way of intentional interference among the transactions that they invoked. Much work had been done for closing the covert channel. Alt...
متن کاملA hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
متن کاملMultilevel Secure Transaction Processing: Status and Prospects
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the database research community. Transaction processing in these systems requires modiication of conventional scheduling algorithms and commit protocols. These modiications are necessary because preserving the usual transaction properties when transaction...
متن کاملTransactional Correctness for Secure Nested Transactions
Secure Nested Transactions are an adaptation of traditional nested transactions to support the synergy of language-based security and multi-level database security. They have application in security for enterprise applications, where transactional semantics are a critical feature in middleware systems. This article considers correctness in terms of transactional properties for secure nested tra...
متن کاملA New Transaction Scheduling Scheme for Active Real-time Database Systems: Space-Filling Curve
This paper presents the space-filling curves and their applicability in scheduling, especially in transaction scheduling in Active Real-time Database Systems (ARTDBS). Active real-time databases have emerged as a research area in which concepts of active databases and real-time databases are combined into a real-time database with reactive behaviour. A novel space-filling curve based approach f...
متن کامل