[1990] Proceedings of the Sixth Annual Computer Security Applications Conference
DOI: 10.1109/csac.1990.143762
|View full text |Cite
|
Sign up to set email alerts
|

Single-level multiversion schedulers for multilevel secure database systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(15 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…The usual notion of correctness for concurrent execution of transactions when multiple versions are maintained in the database is said to be correct when its effect is equivalent to that of a serial execution of the same transactions on a one-copy database, which is called one copy serializability [8]. The significant efforts based on multiversion timestamp-ordering technique are due to Maim one and Greenberg [31], Keefe and Tsai [25], and Jajodia and Atluri [18]. Although these three protocols meet secrecy and availability requirements, Maim one and Greenberg's protocol does not meet the integrity requirement (i.e., it does not generate one-copy serializable histories).…”
Section: Secure Timestamp-based Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…The usual notion of correctness for concurrent execution of transactions when multiple versions are maintained in the database is said to be correct when its effect is equivalent to that of a serial execution of the same transactions on a one-copy database, which is called one copy serializability [8]. The significant efforts based on multiversion timestamp-ordering technique are due to Maim one and Greenberg [31], Keefe and Tsai [25], and Jajodia and Atluri [18]. Although these three protocols meet secrecy and availability requirements, Maim one and Greenberg's protocol does not meet the integrity requirement (i.e., it does not generate one-copy serializable histories).…”
Section: Secure Timestamp-based Protocolsmentioning
confidence: 99%
“…Although these three protocols meet secrecy and availability requirements, Maim one and Greenberg's protocol does not meet the integrity requirement (i.e., it does not generate one-copy serializable histories). We defer the discussion of the first protocol [31] until Section 5.3 and present the latter two [18], [25] in this section.…”
Section: Secure Timestamp-based Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm developed was based on multiversion schedulers. Following their work, Maimone and Greenberg described their version of multiversion scheduling algorithm in [MAIM90]. In this section, we first describe Keefe and Tsai's multiversion scheduling algorithms as given in [KEEF90] and then discuss Maimone and Greenberg's multiversion algorithms described in [MAIM90].…”
Section: Multiversion Algorithmsmentioning
confidence: 99%
“…Maimone and Oreenberg [MAIM90] have designed two algorithms based on the multiversion timestamp ordering technique. One approach was implemented for Trusted Oracle, which is a hybrid approach between locking and timestamping techniques.…”
Section: Maimone and Greenberg's Multiversion Schedulersmentioning
confidence: 99%