Concurrency control performance modeling: alternatives and implications
ACM Transactions on Database Systems (TODS)
Using delayed commitment in locking protocols for real-time databases
SIGMOD '92 Proceedings of the 1992 ACM SIGMOD international conference on Management of data
Scheduling real-time transactions: a performance evaluation
ACM Transactions on Database Systems (TODS)
Data access scheduling in firm real-time database systems
Real-Time Systems - Special issue: real-time databases
Concurrency control in trusted database management systems: a survey
ACM SIGMOD Record
A pump for rapid, reliable, secure communication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Database security
Integrating standard transactions in firm real-time database systems
Information Systems - Special issue on real-time database systems
Multiclass transaction scheduling and overload management in firm real-time database systems
Information Systems - Special issue on real-time database systems
An adaptive policy for improved timeliness in secure database systems
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
A secure concurrency control protocol for real-time databases
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Multilevel secure transaction processing: status and prospects
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
On being optimistic about real-time constraints
PODS '90 Proceedings of the ninth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment
Journal of the ACM (JACM)
The notions of consistency and predicate locks in a database system
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Improving timeliness in real-time secure database systems
ACM SIGMOD Record
Multilevel Secure Database Concurrency Control
Proceedings of the Sixth International Conference on Data Engineering
On Serializability of Multidatabase Transactions Through Forced Local Conflicts
Proceedings of the Seventh International Conference on Data Engineering
Approximate Analysis of Real-Time Database Systems
Proceedings of the Tenth International Conference on Data Engineering
A Two Snapshot Algorithm for Concurrency Control in Multi-Level Secure Databases
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Supporting security requirements in multilevel real-time databases
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Design of concurrency controls for transaction processing systems
Design of concurrency controls for transaction processing systems
Secure buffering in firm real-time database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Secure one snapshot protocol for concurrency control in real-time stock trading systems
Journal of Systems and Software
Towards security and QoS optimization in real-time embedded systems
ACM SIGBED Review - Special issue: The work-in-progress (WIP) session of the RTSS 2005
Multilevel secure data stream processing
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Multilevel secure data stream processing: Architecture and implementation
Journal of Computer Security - DBSec 2011
Hi-index | 0.00 |
Many real-time database applications arise in electronic financialservices, safety-critical installations and military systems whereenforcing security is crucial to the success of the enterprise. Forreal-time database systems supporting applications with firm deadlines,we investigate here the performance implications, in terms of killedtransactions, of guaranteeing multilevel secrecy. In particular, wefocus on the concurrency control (CC) aspects of this issue.Our main contributions are the following: First, we identify whichamong the previously proposed real-time CC protocols are capable ofproviding covert-channel-free security. Second, using a detailedsimulation model, we profile the real-time performance of arepresentative set of these secure CC protocols for a variety ofsecurity-classified workloads and system configurations. Ourexperiments show that a prioritized optimistic CC protocol, OPT-WAIT,provides the best overall performance. Third, we propose and evaluatea novel “dual-CC” approach that allows the real-time database systemto simultaneously use different CC mechanisms for guaranteeing securityand for improving real-time performance. By appropriately choosingthese different mechanisms, concurrency control protocols that provideeven better performance than OPT-WAIT are designed. Finally, wepropose and evaluate GUARD, an adaptive admission-control policydesigned to provide fairness with respect to the distribution of killedtransactions across security levels. Our experiments show that GUARDefficiently provides close to ideal fairness for real-time applicationsthat can tolerate covert channel bandwidths of upto one bit persecond.