A Single-Level Scheduler for the Replicated Architecture for Multilevel-Secure Databases

Download A Single-Level Scheduler for the Replicated Architecture for Multilevel-Secure Databases PDF Online Free

Author :
Release : 1991
Genre :
Kind :
Book Rating : /5 ( reviews)

A Single-Level Scheduler for the Replicated Architecture for Multilevel-Secure Databases - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook A Single-Level Scheduler for the Replicated Architecture for Multilevel-Secure Databases write by . This book was released on 1991. A Single-Level Scheduler for the Replicated Architecture for Multilevel-Secure Databases available in PDF, EPUB and Kindle. The replicated architecture for multilevel secure database systems provides security by replicating data into separate untrusted single-level database systems. To be successful, a system using the replicated architecture must have a concurrency and replica control algorithm that does not introduce any covert channels. Jajodia and Kogan have developed one such algorithm that uses update projections and a write-all replica control algorithm. Here we describe an alternative algorithm. The new algorithm uses replicated transactions and a set of queues organized according to security class. A new definition of correctness is required for this approach, so we present one and use it to show that our algorithm is correct. The existence of this new algorithm increases the viability of the replicated architecture as an alternative to kernelized approaches.

Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture

Download Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture PDF Online Free

Author :
Release : 1992
Genre :
Kind :
Book Rating : /5 ( reviews)

Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture write by . This book was released on 1992. Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture available in PDF, EPUB and Kindle. Replicated architecture has been proposed as a way to obtain acceptable performance in a multilevel secure database system. This architecture contains a separate database for each security level such that each contains replicated data from lower security classes. The consistency of the values of replicated data items must be maintained without unnecessarily interfering with concurrency of database operations. This paper provides a protocol to do this that is secure, since it is free of covert channels, and also ensures one-copy serializability of executing transactions. The protocol can be implemented with untrusted processes for both concurrency and recovery.

Multilevel Secure Transaction Processing

Download Multilevel Secure Transaction Processing PDF Online Free

Author :
Release : 2012-12-06
Genre : Computers
Kind :
Book Rating : 536/5 ( reviews)

Multilevel Secure Transaction Processing - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook Multilevel Secure Transaction Processing write by Vijay Atluri. This book was released on 2012-12-06. Multilevel Secure Transaction Processing available in PDF, EPUB and Kindle. Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing.

Database Security X

Download Database Security X PDF Online Free

Author :
Release : 2016-01-09
Genre : Computers
Kind :
Book Rating : 671/5 ( reviews)

Database Security X - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook Database Security X write by Pierangela Samarati. This book was released on 2016-01-09. Database Security X available in PDF, EPUB and Kindle. The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.

Proceedings

Download Proceedings PDF Online Free

Author :
Release : 1991
Genre : Computer security
Kind :
Book Rating : /5 ( reviews)

Proceedings - read free eBook in online reader or directly download on the web page. Select files or add your book in reader. Download and read online ebook Proceedings write by . This book was released on 1991. Proceedings available in PDF, EPUB and Kindle.