2000
DOI: 10.1007/978-1-4615-4553-8
|View full text |Cite
|
Sign up to set email alerts
|

Multilevel Secure Transaction Processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2001
2001
2013
2013

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(16 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…Consideration of covert channels requires particular care in the design of the enforcement mechanism. For instance, locking and concurrency mechanisms must be revised and be properly designed [7]. A complication in their design is that care must be taken to avoid the policy for blocking covert channels to introduce denials-of-service.…”
Section: Limitations Of Mandatory Policiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Consideration of covert channels requires particular care in the design of the enforcement mechanism. For instance, locking and concurrency mechanisms must be revised and be properly designed [7]. A complication in their design is that care must be taken to avoid the policy for blocking covert channels to introduce denials-of-service.…”
Section: Limitations Of Mandatory Policiesmentioning
confidence: 99%
“…In a closed policy approach, we would have to express the above requirement by specifying a positive authorization for each member of the group except Bob. 7 However, if we combine positive and negative authorizations we can specify the same requirement by granting a positive authorization to the group and a negative authorization to Bob.…”
Section: Expanding Authorizationsmentioning
confidence: 99%
“…In fact, we must do that not all, even some of the attacks should be ward off at the outset. Several security techniques have been proposed to ward off the attacks in databases such as control [2], [15], authorization mechanisms [3], [4], [16] and distributed secure transaction processing [5]. These are very limited bound to ward off to attacks.…”
Section: Introductionmentioning
confidence: 99%
“…A broad span of research from authorization [3,4,5], to inference control [1], to multilevel secure databases [6,7], and to multilevel secure transaction processing [2], addresses primarily how to protect the security of a database. One critical step towards attack resilient database systems is intrusion detection (10).…”
Section: Introductionmentioning
confidence: 99%