ACM SIGMOD Anthology ACM SIGMOD dblp.uni-trier.de

Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture.

Boris Kogan, Sushil Jajodia: Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture. SIGMOD Conference 1990: 153-162
@inproceedings{DBLP:conf/sigmod/KoganJ90,
  author    = {Boris Kogan and
               Sushil Jajodia},
  editor    = {Hector Garcia-Molina and
               H. V. Jagadish},
  title     = {Concurrency Control in Multilevel-Secure Databases Based on Replicated
               Architecture},
  booktitle = {Proceedings of the 1990 ACM SIGMOD International Conference on
               Management of Data, Atlantic City, NJ, May 23-25, 1990},
  publisher = {ACM Press},
  year      = {1990},
  pages     = {153-162},
  ee        = {http://doi.acm.org/10.1145/93597.98725, db/conf/sigmod/KoganJ90.html},
  crossref  = {DBLP:conf/sigmod/90},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

In a multilevel secure database management system based on the replicated architecture, there is a separate database management system to manage data at or below each security level, and lower level data are replicated in all databases containing higher level data. In this paper, we address the open issue of concurrency control in such a system. We give a secure protocol that guarantees one-copy serializability of concurrent transaction executions and can be implemented in such a way that the size of the trusted code (including the code required for concurrency and recovery) is small.

Copyright © 1990 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


ACM SIGMOD Anthology

Online Version (ACM WWW Account required): Full Text in PDF Format

CDROM Version: Load the CDROM "Volume 1 Issue 2, SIGMOD '75-'92" and ...

DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Hector Garcia-Molina, H. V. Jagadish (Eds.): Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data, Atlantic City, NJ, May 23-25, 1990. ACM Press 1990 BibTeX , SIGMOD Record 19(2), June 1990
Contents

Online Edition: ACM Digital Library


References

[1]
...
[2]
...
[3]
...
[4]
Philip A. Bernstein, Vassos Hadzilacos, Nathan Goodman: Concurrency Control and Recovery in Database Systems. Addison-Wesley 1987, ISBN 0-201-10715-5
Contents BibTeX
[5]
...
[6]
Dorothy E. Denning: Cryptography and Data Security. Addison-Wesley 1982
BibTeX
[7]
Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley: The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607(1990) BibTeX
[8]
Judith N. Froscher, Catherine Meadows: Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160 BibTeX
[9]
Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu: A Layered TCB Implementation versus the Hinke-Schaefer Approach. DBSec 1989: 151-165 BibTeX
[10]
Richard D. Graubart: A Comparison of Three Secure DBMS Architectures. DBSec 1989: 167-190 BibTeX
[11]
Jim Gray: Notes on Data Base Operating Systems. Advanced Course: Operating Systems 1978: 393-481 BibTeX
[12]
Jim Gray, Paul R. McJones, Mike W. Blasgen, Bruce G. Lindsay, Raymond A. Lorie, Thomas G. Price, Gianfranco R. Putzolu, Irving L. Traiger: The Recovery Manager of the System R Database Manager. ACM Comput. Surv. 13(2): 223-243(1981) BibTeX
[13]
...
[14]
...
[15]
Thomas H. Hinke: DBMS Technology vs. Threats. DBSec 1987: 57-87 BibTeX
[16]
...
[17]
Catherine D. Jensen, Robert M. Kiel, Richard D. Verjinski: SDDM - A Prototype of a Distributed Architecture for Database Security. ICDE 1989: 356-364 BibTeX
[18]
...
[19]
Boris Kogan, Hector Garcia-Molina: Update Propagation in Bakunin Data Networks. PODC 1987: 13-26 BibTeX
[20]
Butler W. Lampson: A Note on the Confinement Problem. Commun. ACM 16(10): 613-615(1973) BibTeX
[21]
Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
[22]
Glenn H. MacEwen: Effects of Distributed System Technology on Database Security: A Survey. DBSec 1987: 253-261 BibTeX
[23]
...
[24]
David P. Reed, Rajendra K. Kanodia: Synchronization with Eventcounts and Sequences. Commun. ACM 22(2): 115-123(1979) BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:40:01 2009