ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture.

Boris Kogan, Sushil Jajodia: Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture. SIGMOD Conference 1990: 153-162
@inproceedings{DBLP:conf/sigmod/KoganJ90,
  author    = {Boris Kogan and
               Sushil Jajodia},
  editor    = {Hector Garcia-Molina and
               H. V. Jagadish},
  title     = {Concurrency Control in Multilevel-Secure Databases Based on Replicated
               Architecture},
  booktitle = {Proceedings of the 1990 ACM SIGMOD International Conference on
               Management of Data, Atlantic City, NJ, May 23-25, 1990},
  publisher = {ACM Press},
  year      = {1990},
  pages     = {153-162},
  ee        = {http://doi.acm.org/10.1145/93597.98725, db/conf/sigmod/KoganJ90.html},
  crossref  = {DBLP:conf/sigmod/90},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

Abstract

In a multilevel secure database management system based on the replicated architecture, there is a separate database management system to manage data at or below each security level, and lower level data are replicated in all databases containing higher level data. In this paper, we address the open issue of concurrency control in such a system. We give a secure protocol that guarantees one-copy serializability of concurrent transaction executions and can be implemented in such a way that the size of the trusted code (including the code required for concurrency and recovery) is small.

Copyright © 1990 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


ACM SIGMOD Anthology

Online Version (ACM WWW Account required): Full Text in PDF Format

CDROM Version: Load the CDROM "Volume 1 Issue 2, SIGMOD '75-'92" and ...

DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...

Printed Edition

Hector Garcia-Molina, H. V. Jagadish (Eds.): Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data, Atlantic City, NJ, May 23-25, 1990. ACM Press 1990 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML, SIGMOD Record 19(2), June 1990
Contents

Online Edition: ACM Digital Library


References

[1]
...
[2]
...
[3]
...
[4]
Philip A. Bernstein, Vassos Hadzilacos, Nathan Goodman: Concurrency Control and Recovery in Database Systems. Addison-Wesley 1987, ISBN 0-201-10715-5
Contents CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[5]
...
[6]
Dorothy E. Denning: Cryptography and Data Security. Addison-Wesley 1982
CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[7]
Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley: The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607(1990) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[8]
Judith N. Froscher, Catherine Meadows: Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[9]
Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu: A Layered TCB Implementation versus the Hinke-Schaefer Approach. DBSec 1989: 151-165 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[10]
Richard D. Graubart: A Comparison of Three Secure DBMS Architectures. DBSec 1989: 167-190 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[11]
Jim Gray: Notes on Data Base Operating Systems. Advanced Course: Operating Systems 1978: 393-481 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[12]
Jim Gray, Paul R. McJones, Mike W. Blasgen, Bruce G. Lindsay, Raymond A. Lorie, Thomas G. Price, Gianfranco R. Putzolu, Irving L. Traiger: The Recovery Manager of the System R Database Manager. ACM Comput. Surv. 13(2): 223-243(1981) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[13]
...
[14]
...
[15]
Thomas H. Hinke: DBMS Technology vs. Threats. DBSec 1987: 57-87 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[16]
...
[17]
Catherine D. Jensen, Robert M. Kiel, Richard D. Verjinski: SDDM - A Prototype of a Distributed Architecture for Database Security. ICDE 1989: 356-364 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[18]
...
[19]
Boris Kogan, Hector Garcia-Molina: Update Propagation in Bakunin Data Networks. PODC 1987: 13-26 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[20]
Butler W. Lampson: A Note on the Confinement Problem. Commun. ACM 16(10): 613-615(1973) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[21]
Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278(1981) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[22]
Glenn H. MacEwen: Effects of Distributed System Technology on Database Security: A Survey. DBSec 1987: 253-261 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[23]
...
[24]
David P. Reed, Rajendra K. Kanodia: Synchronization with Eventcounts and Sequences. Commun. ACM 22(2): 115-123(1979) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

Copyright © Sun Mar 14 23:25:38 2010 by Michael Ley (ley@uni-trier.de)