Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng. 9(5): 697-708(1997)@article{DBLP:journals/tkde/AtluriJB97,
author = {Vijayalakshmi Atluri and
Sushil Jajodia and
Elisa Bertino},
title = {Transaction Processing in Multilevel Secure Databases with Kernelized
Architectures: Challenges and Solutions},
journal = {IEEE Trans. Knowl. Data Eng.},
volume = {9},
number = {5},
year = {1997},
pages = {697-708},
ee = {db/journals/tkde/AtluriJB97.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Copyright © 1997 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
BibTeX
References
- [1]
- ...
- [2]
- Paul Ammann, Sushil Jajodia:
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.
DBSec 1991: 191-202 BibTeX
- [3]
- Paul Ammann, Sushil Jajodia:
Planar Lattice Security Structures for Multilevel Replicated Databases.
DBSec 1993: 125-134 BibTeX
- [4]
- ...
- [5]
- Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
DBSec 1994: 259-274 BibTeX
- [6]
- Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng. 8(5): 839-854(1996) BibTeX
- [7]
- ...
- [8]
- Philip A. Bernstein, Vassos Hadzilacos, Nathan Goodman:
Concurrency Control and Recovery in Database Systems.
Addison-Wesley 1987, ISBN 0-201-10715-5
Contents BibTeX
- [9]
- Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng. 10(1): 120-135(1998) BibTeX
- [10]
- ...
- [11]
- Oliver Costich:
Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture.
DBSec 1991: 173-189 BibTeX
- [12]
- Dorothy E. Denning:
Cryptography and Data Security.
Addison-Wesley 1982
BibTeX
- [13]
- ...
- [14]
- ...
- [15]
- ...
- [16]
- Jim Gray, Raymond A. Lorie, Gianfranco R. Putzolu, Irving L. Traiger:
Granularity of Locks and Degrees of Consistency in a Shared Data Base.
IFIP Working Conference on Modelling in Data Base Management Systems 1976: 365-394 BibTeX
- [17]
- Jim Gray, Andreas Reuter:
Transaction Processing: Concepts and Techniques.
Morgan Kaufmann 1993, ISBN 1-55860-190-2
Contents BibTeX
- [18]
- ...
- [19]
- Sushil Jajodia, Boris Kogan:
Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture.
IEEE Symposium on Security and Privacy 1990: 360-368 BibTeX
- [20]
- Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Secure Locking Protocols for Multilevel Database Management Systems.
DBSec 1996: 177-194 BibTeX
- [21]
- ...
- [22]
- Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein:
Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases.
DBSec 1993: 109-121 BibTeX
- [23]
- ...
- [24]
- ...
- [25]
- Thomas F. Keefe, Wei-Tek Tsai:
Multiversion Concurrency Control for Multilevel Secure Database Systems.
IEEE Symposium on Security and Privacy 1990: 369-383 BibTeX
- [26]
- Leslie Lamport:
Concurrent Reading and Writing.
Commun. ACM 20(11): 806-811(1977) BibTeX
- [27]
- Leslie Lamport:
Time, Clocks, and the Ordering of Events in a Distributed System.
Commun. ACM 21(7): 558-565(1978) BibTeX
- [28]
- Carl E. Landwehr:
Formal Models for Computer Security.
ACM Comput. Surv. 13(3): 247-278(1981) BibTeX
- [29]
- Barbara Liskov:
Practical Uses of Synchronized Clocks in Distributed Systems.
PODC 1991: 1-9 BibTeX
- [30]
- ...
- [31]
- ...
- [32]
- Daryl McCullough:
A Hookup Theorem for Multilevel Security.
IEEE Trans. Software Eng. 16(6): 563-568(1990) BibTeX
- [33]
- John P. McDermott, Sushil Jajodia:
Orange Locking: Channel-Free Database Concurrency Control Via Locking.
DBSec 1992: 267-284 BibTeX
- [34]
- Catherine Meadows, Sushil Jajodia:
Integrity Versus Security in Multi-Level Secure Databases.
DBSec 1987: 89-101 BibTeX
- [35]
- ...
- [36]
- C. Mohan, Bruce G. Lindsay, Ron Obermarck:
Transaction Management in the R* Distributed Database Management System.
ACM Trans. Database Syst. 11(4): 378-396(1986) BibTeX
- [37]
- Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems.
ACM Conference on Computer and Communications Security 1996: 119-128 BibTeX
- [38]
- David P. Reed, Rajendra K. Kanodia:
Synchronization with Eventcounts and Sequences.
Commun. ACM 22(2): 115-123(1979) BibTeX
- [39]
- ...
- [40]
- James W. Stamos, Flaviu Cristian:
Coordinator Log Transaction Execution Protocol.
Distributed and Parallel Databases 1(4): 383-408(1993) BibTeX
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
IEEE Transactions on Data and Knowledge Engineering: Copyright © by IEEE,
Joint ACM SIGMOD / IEEE Computer Society Anthology: Copyright © by ACM (info@acm.org) and IEEE, Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sun May 17 00:28:53 2009