Proceedings 12th Euromicro Conference on Real-Time Systems. Euromicro RTS 2000
DOI: 10.1109/emrts.2000.853993
|View full text |Cite
|
Sign up to set email alerts
|

An adaptable security manager for real-time transactions

Abstract: The rising demand for real-time services over the netw ork such as w eb-based information services requires new approaches for balancing competing demands on limited resources. The BeeHive database system proposes a n o vel solution to this need by the use of adaptive real-time, fault tolerance, quality of service and security services based upon rules embedded in individual objects 1]. These rules prescribe tradeo s of alternate levels of service (and cost) when resource conten tion becomes a problem. The app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 1 publication
0
20
0
Order By: Relevance
“…There have also been other works addressing the security issue [25], [26] in real-time systems. Xie et al [34] have presented challenges and open issues in security-aware real-time scheduling for distributed systems.…”
Section: Related Workmentioning
confidence: 99%
“…There have also been other works addressing the security issue [25], [26] in real-time systems. Xie et al [34] have presented challenges and open issues in security-aware real-time scheduling for distributed systems.…”
Section: Related Workmentioning
confidence: 99%
“…The access control problem in the multilevel security model has been studied in the real-time database literature [1,15,16,4,6]. A majority of these work [1,15,16] temporarily allow a covert channel, which can be used by an adversary to enable an illegal information flow between different security levels, to improve the timeliness under overload conditions.…”
Section: Related Workmentioning
confidence: 99%
“…A majority of these work [1,15,16] temporarily allow a covert channel, which can be used by an adversary to enable an illegal information flow between different security levels, to improve the timeliness under overload conditions. George et al [4] propose a secure real-time concurrency control protocol to avoid a covert channel.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Notably, the deviation of the answer to the query can be bounded, different from a similar approach called quasi serializability [26]. An adaptable security manager is proposed in [119], in which the database security level can be temporarily degraded to enhance timeliness. These performance trade-off schemes lack a systematic QoS management architecture and none of them consider providing guarantees for both miss ratio and data freshness.…”
Section: Earlier Workmentioning
confidence: 99%