Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Modular Concurrency Control and Failure Recovery
IEEE Transactions on Computers
Formal model of correctness without serializabilty
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
Using semantic knowledge of transactions to increase concurrency
ACM Transactions on Database Systems (TODS)
Quasi serializability: a correctness criterion for global concurrency control in InterBase
VLDB '89 Proceedings of the 15th international conference on Very large data bases
A theory of relaxed atomicity (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Hybrid concurrency control for abstract data types
Journal of Computer and System Sciences
Semantics-based concurrency control: beyond commutativity
ACM Transactions on Database Systems (TODS)
Simple rational guidance for chopping up transactions
SIGMOD '92 Proceedings of the 1992 ACM SIGMOD international conference on Management of data
An introduction to formal specification and Z
An introduction to formal specification and Z
Database transaction models for advanced applications
Consistency and orderability: semantics-based correctness criteria for databases
ACM Transactions on Database Systems (TODS)
Formal aspects of concurrency control in long-duration transaction systems using the NT/PV model
ACM Transactions on Database Systems (TODS)
Role-Based Access Control Models
Computer
Applying formal methods to semantic-based decomposition of transactions
ACM Transactions on Database Systems (TODS)
Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Concurrency control: methods, performance, and analysis
ACM Computing Surveys (CSUR)
Conflict analysis for management policies
Proceedings of the fifth IFIP/IEEE international symposium on Integrated network management V : integrated management in a virtual world: integrated management in a virtual world
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
Using semantic knowledge for transaction processing in a distributed database
ACM Transactions on Database Systems (TODS)
Multilevel atomicity—a new correctness criterion for database concurrency control
ACM Transactions on Database Systems (TODS)
Enterprise information systems
Techniques for Supporting Dynamic and Adaptive Workflow
Computer Supported Cooperative Work
Information Sciences—Informatics and Computer Science: An International Journal
Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
A Formal Approach to Recovery by Compensating Transactions
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
Use of an Experimental Policy Workbench: Description and Preliminary Results
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
A Flexible Method for Information System Security Policy Specification
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Building reconfiguration primitives into the law of a system
ICCDS '96 Proceedings of the 3rd International Conference on Configurable Distributed Systems
Exploiting transaction semantics in multidatabase systems
ICDCS '95 Proceedings of the 15th International Conference on Distributed Computing Systems
Ensuring Atomicity of Multilevel Transactions
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Real-time update of access control policies
Data & Knowledge Engineering
A lattice-based approach for updating access control policies in real-time
Information Systems
Semantic query Cache using Dynamic Facts (SCDF): a novel approach to efficient information retrieval
International Journal of Metadata, Semantics and Ontologies
Proceedings of the 15th ACM symposium on Access control models and technologies
Towards automatic update of access control policy
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Hi-index | 0.00 |
Real-time update of access control policies, that is, updating policies while they are in effect and enforcing the changes immediately, is necessary for many security-critical applications. In this paper, we consider real-time update of access control policies in a database system. Updating policies while they are in effect can lead to potential security problems, such as, access to database objects by unauthorized users. In this paper, we propose several algorithms that not only prevent such security breaches but also ensure the correctness of execution. The algorithms differ from each other in the degree of concurrency provided and the semantic knowledge used. Of the algorithms presented, the most concurrency is achieved when transactions are decomposed into atomic steps. Once transactions are decomposed, the atomicity, consistency, and isolation properties no longer hold. Since the traditional transaction processing model can no longer be used to ensure the correctness of the execution, we use an alternate semantic-based transaction processing model. To ensure correct behavior, our model requires an application to satisfy a set of necessary properties, namely, semantic atomicity, consistent execution, sensitive transaction isolation, and policy-compliant. We show how one can verify an application statically to check for the existence of these properties.