Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
High assurance discretionary access control for object bases
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Role-Based Access Control Models
Computer
A lattice model of secure information flow
Communications of the ACM
The notions of consistency and predicate locks in a database system
Communications of the ACM
Lattice-Based Access Control Models
Computer
A Role-Based Access Control for Intranet Security
IEEE Internet Computing
Role-Based Access Control
Information Flow Control in Role-Based Model for Distributed Objects
ICPADS '01 Proceedings of the Eighth International Conference on Parallel and Distributed Systems
Role Locks to Prevent Illegal Information Flow among Objects
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Concurrency Control Based-on Significancy on Roles
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Role-Based Concurrency Control for Distributed Systems
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 01
Concurrency Control using Subject- and Purpose-Oriented (SPO) View
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Hi-index | 0.00 |
Multiple agents cooperate with each other through manipulating objects. A transaction is a unit of work issued by an agent. A transaction is assigned with a purpose which is a subfamily of roles granted to the agent. Even if transactions issue methods according to the purposes, illegal information flow might occur. We define legal, independent, illegal, and possibly illegal information flow relations among purposes. We discussed the purpose-based marking protocol to prevent illegal information flow. Then, we discussed the releasing mechanism of purpose marks to improve the throughput. Finally, we evaluated the Purpose-based Marking and Releasing (PMR) protocol.