An introduction to database systems: vol. I (4th ed.)
An introduction to database systems: vol. I (4th ed.)
The theory of database concurrency control
The theory of database concurrency control
Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Extending the Noninterference Version of MLS for SAT
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
Building a secure computer system
Building a secure computer system
A Hookup Theorem for Multilevel Security
IEEE Transactions on Software Engineering
IEEE Transactions on Software Engineering
SODA: a secure object-oriented database system
Computers and Security
On optimistic methods for concurrency control
ACM Transactions on Database Systems (TODS)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Synchronization with eventcounts and sequencers
Communications of the ACM
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Multilevel secure database management systems
Multilevel secure database management systems
A secure dynamic copy protocol in real-time secure database systems
Proceedings of the ACM SIGPLAN 1999 workshop on Languages, compilers, and tools for embedded systems
Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems
IEEE Transactions on Knowledge and Data Engineering
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Shell's Trust Domain Infrastructure Security Certification
Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security: Advances in Network and Distributed Systems Security
The freeze algorithms for concurrency control in secure real-time database systems
Data & Knowledge Engineering
Access Control and Information Flow in Transactional Memory
Formal Aspects in Security and Trust
Secure transaction management protocols for MLS/DDBMS
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Hi-index | 0.00 |
Concurrent execution of transactions in database management systems (DBMSs) may lead to contention for access to data, which in a multilevel secure DBMS (MLS/DBMS) may lead to insecurity. Security issues involved in database concurrency control for MLS/DBMSs are examined, and it is shown how a scheduler can affect security. Data conflict security, (DC-security), a property that implies a system is free of covert channels due to contention for access to data, is introduced. A definition of DC-security based on noninterference is presented. Two properties that constitute a necessary condition for DC-security are introduced along with two simpler necessary conditions. A class of schedulers called output-state-equivalent is identified for which another criterion implies DC-security. The criterion considers separately the behavior of the scheduler in response to those inputs that cause rollback and those that do not. The security properties of several existing scheduling protocols are characterized. Many are found to be insecure.