Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy 1990
DOI: 10.1109/risp.1990.63865
|View full text |Cite
|
Sign up to set email alerts
|

Multiversion concurrency control for multilevel secure database systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

1992
1992
2006
2006

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(27 citation statements)
references
References 9 publications
0
27
0
Order By: Relevance
“…In [KT90], a scheduler is proposed which is secure and produces one-copy serializable histories to which our model can be applied. However, it uses a multilevel scheduler which, therefore, has to be trusted, thus it is only suitable for the trusted subject architecture.…”
Section: Fix Information Maintenancementioning
confidence: 99%
“…In [KT90], a scheduler is proposed which is secure and produces one-copy serializable histories to which our model can be applied. However, it uses a multilevel scheduler which, therefore, has to be trusted, thus it is only suitable for the trusted subject architecture.…”
Section: Fix Information Maintenancementioning
confidence: 99%
“…The architecture for the systems under consideration is based on one that is frequently proposed [7,8]. The security features are enforced by a security kernel, the trusted computing base of the trusted operating system, together with whatever additional trusted processes are necessary in the database application to enforce the overall system's security policy.…”
Section: The Security Modelmentioning
confidence: 99%
“…There is a set D of data items of the database system that serve as the objects of the multilevel system. The subjects of the system, denoted Sub, are quite similar to the single-level transactions used in earlier work [3,6,7,8,9,10]. However our transactions will be more complex and will be formed by interleaving the subjects of the database system.…”
Section: The Security Modelmentioning
confidence: 99%
“…Further work was carried out by Keefe and Tsai [KEEF90]. The algorithm developed was based on multiversion schedulers.…”
Section: Multiversion Algorithmsmentioning
confidence: 99%