Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Synchronization with eventcounts and sequencers
Communications of the ACM
Concurrent reading and writing
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Cryptography and data security
Cryptography and data security
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Structuring Fault-Tolerant Object Systems for Modularity in a Distributed Environment
IEEE Transactions on Parallel and Distributed Systems
Multilevel Secure Database Concurrency Control
Proceedings of the Sixth International Conference on Data Engineering
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A multilevel file system for high assurance
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Flexible Transaction Dependencies in Database Systems
Distributed and Parallel Databases
A nested transaction model for multilevel secure database management systems
ACM Transactions on Information and System Security (TISSEC)
IEEE Transactions on Knowledge and Data Engineering
Verified Order-Based Transaction Scheduling Scheme for Multilevel Secure Database Management Systems
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
An extended transaction model approach for multilevel secure transaction processing
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks and ISDN Systems
A high assurance MLS file server
ACM SIGOPS Operating Systems Review
A multi-purpose implementation of mandatory access control in relational database management systems
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS)
Computer Communications
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
WLAN security performance study
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
Hi-index | 0.00 |
The concurrency control requirements for transaction processing in a multilevel secure file system are different from those in conventional transaction processing systems. In particular, there is the need to coordinate transactions at different security levels avoiding both potential timing covert channels and the starvation of transactions at higher security levels. Suppose a transaction at a lower security level attempts to write a data item that is being read by a transaction at a higher security level. On the one hand, a timing covert channel arises if the transaction at the lower security level is either delayed or aborted by the scheduler. On the other hand, the transaction at the high security level may be subjected to an indefinite delay if it is forced to abort repeatedly. This paper extends the classical two-phase locking mechanism to multilevel secure file systems. The scheme presented here prevents potential timing covert channels and avoids the abort of higher level transactions nonetheless guaranteeing serializability. The programmer is provided with a powerful set of linguistic constructs that supports exception handling, partial rollback, and forward recovery. The proper use of these constructs can prevent the indefinite delay in completion of a higher level transaction, and allows the programmer to trade off starvation with transaction isolation.