Application of Unique View Consistency for Elimination of Covert Channels in Real-Time Secure Transaction Processing Systems

نویسندگان

  • Namgyu Kim
  • Songchun Moon
  • Yonglak Sohn
چکیده

171 Application of Unique View Consistency for Elimination of Covert Channels in Real-Time Secure Transaction Processing Systems Namgyu Kim and Songchun Moon Database Laboratory, Department of Management Engineering, Korea Advanced Institute of Science and Technology, Graduate School of Management, 207-43 Cheongryangri-dong, Dongdaemungu, Seoul 130-012 Korea Email: [email protected] Email: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Establishing Multi-level Security in Mobile Data Access

Transaction processing over mobile networks faces new challenges due to limitations in bandwidth and available power, as well as due to intermittent connectivity that causes loss of data and transaction aborts. Besides, the possibility of security breach increases substantially due to the frequent motion of clients across cells, which gives rise to novel forms of covert channels. In this paper,...

متن کامل

Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity'

Database systems for real-time applications must satisfy timing constraints associated with transactions , in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that due to the...

متن کامل

Integrating Security and Real-Time Requirements Using Covert Channel Capacity

ÐDatabase systems for real-time applications must satisfy timing constraints associated with transactions in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that, due to the...

متن کامل

Advanced Transaction Processing in Multilevel Secure File Stores

The concurrency control requirements for transaction processing in a multilevel secure file system are different from those in conventional transaction processing systems. In particular, there is the need to coordinate transactions at different security levels avoiding both potential timing covert channels and the starvation of transactions at higher security levels. Suppose a transaction at a ...

متن کامل

Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture

Replicated architecture has been proposed as a way to obtain acceptable performance in a multilevel secure database system. This architecture contains a separate database for each security level such that each contains replicated data from lower security classes. The consistency of the values of replicated data items must be maintained without unnecessarily interfering with concurrency of datab...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Research and Practice in Information Technology

دوره 36  شماره 

صفحات  -

تاریخ انتشار 2004