Application of Unique View Consistency for Elimination of Covert Channels in Real-Time Secure Transaction Processing Systems
نویسندگان
چکیده
171 Application of Unique View Consistency for Elimination of Covert Channels in Real-Time Secure Transaction Processing Systems Namgyu Kim and Songchun Moon Database Laboratory, Department of Management Engineering, Korea Advanced Institute of Science and Technology, Graduate School of Management, 207-43 Cheongryangri-dong, Dongdaemungu, Seoul 130-012 Korea Email: [email protected] Email: [email protected]
منابع مشابه
Establishing Multi-level Security in Mobile Data Access
Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and available power, as well as due to intermittent connectivity that causes loss of data and transaction aborts. Besides, the possibility of security breach increases substantially due to the frequent motion of clients across cells, which gives rise to novel forms of covert channels. In this paper,...
متن کاملCorrection to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity'
Database systems for real-time applications must satisfy timing constraints associated with transactions , in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that due to the...
متن کاملIntegrating Security and Real-Time Requirements Using Covert Channel Capacity
ÐDatabase systems for real-time applications must satisfy timing constraints associated with transactions in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that, due to the...
متن کاملAdvanced Transaction Processing in Multilevel Secure File Stores
The concurrency control requirements for transaction processing in a multilevel secure file system are different from those in conventional transaction processing systems. In particular, there is the need to coordinate transactions at different security levels avoiding both potential timing covert channels and the starvation of transactions at higher security levels. Suppose a transaction at a ...
متن کاملTransaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture
Replicated architecture has been proposed as a way to obtain acceptable performance in a multilevel secure database system. This architecture contains a separate database for each security level such that each contains replicated data from lower security classes. The consistency of the values of replicated data items must be maintained without unnecessarily interfering with concurrency of datab...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Journal of Research and Practice in Information Technology
دوره 36 شماره
صفحات -
تاریخ انتشار 2004