1997
DOI: 10.1109/69.634749
|View full text |Cite
|
Sign up to set email alerts
|

Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2000
2000
2015
2015

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…INTRODUCTION from covert channels have been proposed in the literature [3,13]. Most of these schedulers prevent covert channels by…”
Section: Multilevel Security Requirements Introduce a Newmentioning
confidence: 99%
“…INTRODUCTION from covert channels have been proposed in the literature [3,13]. Most of these schedulers prevent covert channels by…”
Section: Multilevel Security Requirements Introduce a Newmentioning
confidence: 99%
“…Several approaches have been proposed for centralized secure concurrency control in MLS/DBMSs. Most of these are either extension of the 2PL protocol or of timestamp-based protocols (Atluri, Jajodia & Bertino, 1997). The performance of secure concurrency control algorithms has also been studied (Son &David, 1994 andSohn &Moon, 2000.).…”
Section: Introductionmentioning
confidence: 99%
“…It has been found that signaling channels exist in classical transaction processing protocols (described in Chapter 3), especially concurrency control protocols, when a database system using these protocols is extended to a multilevel secure database system [AJB97]. Eliminating such signaling channels is one of the main challenges in developing a multilevel secure database system.…”
Section: * Propertymentioning
confidence: 99%
“…For a multilevel secure (MLS) database system, traditional concurrency control and recovery protocols, however, are usually not enough to satisfy security requirements [AJB97], especially, they can cause signaling channels from high level processes to low level processes. Therefore, secure transaction processing is required.…”
Section: Fix Information Maintenancementioning
confidence: 99%