Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Role-Based Access Control Models
Computer
Lattice-Based Access Control Models
Computer
A Role-Based Access Control for Intranet Security
IEEE Internet Computing
Notes on Data Base Operating Systems
Operating Systems, An Advanced Course
Concurrency Control Based-on Significancy on Roles
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Hi-index | 0.00 |
In the role-based access control model, a role is a set of access rights. A subject doing jobs is granted roles showing the jobs in an enterprise. A transaction issued by a subject is associated with a subset of roles granted to the subject, which is named purpose. A method with a more significant purpose is performed before another method with a less significant purpose. We discuss which purpose is more significant than another purpose. We discuss two types of role-ordering (RO) schedulers SRO and PRO where multiple conflicting transactions are serializable in the significant order of subjects and purposes, respectively. We evaluate the RO schedulers compared with the traditional two-phase locking protocol in terms of throughput.