Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
High assurance discretionary access control for object bases
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Role-Based Access Control Models
Computer
A lattice model of secure information flow
Communications of the ACM
Cryptography and data security
Cryptography and data security
Lattice-Based Access Control Models
Computer
A Role-Based Access Control for Intranet Security
IEEE Internet Computing
Notes on Data Base Operating Systems
Operating Systems, An Advanced Course
Information Flow Control in Role-Based Model for Distributed Objects
ICPADS '01 Proceedings of the Eighth International Conference on Parallel and Distributed Systems
Role Locks to Prevent Illegal Information Flow among Objects
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Hi-index | 0.00 |
A Role-Based Access Control (RBAC) model is used to make a system secure. In addition to keeping systems secure, objects have to be consistent in the presence of multiple transactions. Traditional locking protocols and timestamp ordering schedulers are based on 'first-comer-winner' and 'timestamp order' principles to make multiple conflicting transactions serialisable, respectively. In this paper, we discuss concurrency control algorithms based on the significance of roles. We discuss a Role Ordering (RO) scheduler so that multiple conflicting transactions are serialisable in a significant dominant relation of roles. We evaluate the RO scheduler as compared with the Two-Phase Locking (2PL) protocol.