Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Scheduling real-time transactions: a performance evaluation
ACM Transactions on Database Systems (TODS)
Hybrid protocols using dynamic adjustment of serialization order for real-time concurrency control
Real-Time Systems - Special issue: real-time databases
Performance of concurrency control algorithms for real-time database systems
Performance of concurrency control mechanisms in centralized database systems
Design and analysis of an adaptive policy for secure real-time locking protocol
Information Sciences: an International Journal
Secure transaction processing in firm real-time database systems
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
A secure concurrency control protocol for real-time databases
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
A security model for dynamic adaptive traffic masking
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
A note on the confinement problem
Communications of the ACM
Multilevel Secure Database Concurrency Control
Proceedings of the Sixth International Conference on Data Engineering
Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Maintaining Security in Firm Real-Time Database Systems
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
On Introducing Noise into the Bus-Contention Channel
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
An Analysis of the Timed Z-channel
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Mathematical Theory of Communication
A Mathematical Theory of Communication
Maintaining security and timeliness in real-time database system
Journal of Systems and Software
Differentiated Real-Time Data Services for E-Commerce Applications
Electronic Commerce Research
Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity'
IEEE Transactions on Knowledge and Data Engineering
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
IEEE Transactions on Knowledge and Data Engineering
Managing Deadline Miss Ratio and Sensor Data Freshness in Real-Time Databases
IEEE Transactions on Knowledge and Data Engineering
Real-Time Databases and Data Services
Real-Time Systems
Scheduling Security-Critical Real-Time Applications on Clusters
IEEE Transactions on Computers
Improving security for periodic tasks in embedded systems through scheduling
ACM Transactions on Embedded Computing Systems (TECS)
Towards security and QoS optimization in real-time embedded systems
ACM SIGBED Review - Special issue: The work-in-progress (WIP) session of the RTSS 2005
Journal of Parallel and Distributed Computing
Hiding information in multi level security systems
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Time-based intrusion detection in cyber-physical systems
Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems
A security-oriented task scheduler for heterogeneous distributed systems
HiPC'06 Proceedings of the 13th international conference on High Performance Computing
Enhancing security of real-time applications on grids through dynamic scheduling
JSSPP'05 Proceedings of the 11th international conference on Job Scheduling Strategies for Parallel Processing
Fairness strategy for multilevel secure concurrency control protocol
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Journal of Computer and System Sciences
Hi-index | 0.00 |
Database systems for real-time applications must satisfy timing constraints associated with transactions in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we argue that, due to the conflicting goals of each requirement, trade-offs need to be made between security and timeliness. We first define mutual information, a measure of the degree to which security is being satisfied by a system. A secure two-phase locking protocol is then described and a scheme is proposed to allow partial violations of security for improved timeliness. Analytical expressions for the mutual information of the resultant covert channel are derived and a feedback control scheme is proposed that does not allow the mutual information to exceed a specified upper bound. Results showing the efficacy of the scheme obtained through simulation experiments are also discussed.