[1989 Proceedings] Fifth Annual Computer Security Applications Conference
DOI: 10.1109/csac.1989.81051
|View full text |Cite
|
Sign up to set email alerts
|

Issues in distributed database security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…This approach allows a simple and uniform model of a scheduler for a large class of scheduling protocols.We can also imagine scheduling being carried out by several untrusted schedulers, each one scheduling the actions of subjects at a single classification level. This is the approach taken in [4], [7], [15], [23], and [28]. Adopting this approach can simplify arguments about the security of scheduling.…”
Section: Researchm Ethodologymentioning
confidence: 99%
See 1 more Smart Citation
“…This approach allows a simple and uniform model of a scheduler for a large class of scheduling protocols.We can also imagine scheduling being carried out by several untrusted schedulers, each one scheduling the actions of subjects at a single classification level. This is the approach taken in [4], [7], [15], [23], and [28]. Adopting this approach can simplify arguments about the security of scheduling.…”
Section: Researchm Ethodologymentioning
confidence: 99%
“…Several untrusted schedulers have been proposed. In [7], the authors suggest modifications to the optimistic scheduling protocol [20] for use in MLS/DBMS"s. In [20], two variations on the optimistic approach are described; they are serial validation and parallel validation. Both approaches make use of at least one critical section.…”
Section: Ansari Et Al International Journal Of Advanced Research Inmentioning
confidence: 99%
“…Designing scalable system for supporting extremely large number of requests caring about security issues is stated by Alan R. Downing [6]. Privacy is another important feature for such important data because of its static nature like fingerprint and iris scan etc.…”
Section: Related Workmentioning
confidence: 99%
“…A number of secure concurrency control techniques have been prop0~d ifl the literature which address the problem of covert timing channels. Some of these works [12,7] that employ a lock based protocol on single version data, abort a higher level transaction Ti that is reading down, when a lower level updating transaction Tj conflicts with T~. The drawback of these protocols is that transactions that read down may be subject to starvation.…”
Section: Introductionmentioning
confidence: 99%