메뉴 건너뛰기




Volumn , Issue , 1994, Pages 118-125

An efficient multiversion algorithm for secure servicing of transaction reads

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY;

EID: 24744447827     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/191177.191201     Document Type: Conference Paper
Times cited : (7)

References (24)
  • 1
    • 0027649548 scopus 로고
    • Distributed timestamp generation in planar lattice networks
    • August
    • [AJ93] Paul Ammann and Sushil Jajodia. Distributed timestamp generation in planar lattice networks. ACM Transactions on Computer Systems, 11(3):205-225, August 1993.
    • (1993) ACM Transactions on Computer Systems , vol.11 , Issue.3 , pp. 205-225
    • Ammann, P.1    Jajodia, S.2
  • 7
    • 0026853330 scopus 로고
    • A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture
    • Oakland, CA, May
    • [CM92] Oliver Costich and John P. McDermott. A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture. In Proceedings of the Symposium on Research in Security and Privacy, pages 192-203, Oakland, CA, May 1992.
    • (1992) Proceedings of the Symposium on Research in Security and Privacy , pp. 192-203
    • Costich, O.1    McDermott, J.P.2
  • 8
    • 0004697361 scopus 로고
    • Committee on Multilevel Data Management Security, Air Force Studies Board, National Research Council, Washington, DC
    • [Com83] Committee on Multilevel Data Management Security, Air Force Studies Board, National Research Council, Washington, DC. Multilevel Data Management Security, 1983.
    • (1983) Multilevel Data Management Security
  • 9
    • 0004654575 scopus 로고
    • Transaction processing using an untrusted scheduler in a multilevel database with replicated architecture
    • Carl Landwehr and Sushil. Jajodia, editors, North Holland
    • [Cos92] Oliver Costich. Transaction processing using an untrusted scheduler in a multilevel database with replicated architecture. In Carl Landwehr and Sushil. Jajodia, editors, Database Security V: Status and Prospects, pages 173-190. North Holland, 1992.
    • (1992) Database Security V: Status and Prospects , pp. 173-190
    • Costich, O.1
  • 11
    • 0003969633 scopus 로고
    • DoD Computer Security Center, December, DoD 5200.28-STD
    • [DoD85] DoD Computer Security Center. Trusted Computer System Evaluation Criteria, December 1985. DoD 5200.28-STD.
    • (1985) Trusted Computer System Evaluation Criteria
  • 12
    • 1642304751 scopus 로고
    • Achieving a trusted database management system using parallelism
    • C. Landwehr and S. Jajodia, editors, North Holland
    • [FM89] Judy Froscher and Cathy Meadows. Achieving a trusted database management system using parallelism. In C. Landwehr and S. Jajodia, editors, Database Security II: Status and Prospects, pages 151-160. North Holland, 1989.
    • (1989) Database Security II: Status and Prospects , pp. 151-160
    • Froscher, J.1    Meadows, C.2
  • 13
    • 0022866757 scopus 로고
    • Partitioned two-phase locking
    • December
    • [HC86] Meichun Hsu and Arvola Chan. Partitioned two-phase locking. ACM Transactions on Database Systems, 11(4):431-446, December 1986.
    • (1986) ACM Transactions on Database Systems , vol.11 , Issue.4 , pp. 431-446
    • Hsu, M.1    Chan, A.2
  • 17
    • 0004722082 scopus 로고
    • On transaction processing for multilevel secure replicated databases
    • Toulouse, France, Springer-Verlag. Lecture Notes in Computer Science
    • [KK92] I. E. Kang and T. F. Keefe. On transaction processing for multilevel secure replicated databases. In Proceedings European Symposium on Research in Computer Security, pages 329-347, Toulouse, France, 1992. Springer-Verlag. Lecture Notes in Computer Science, Volume 648.
    • (1992) Proceedings European Symposium on Research in Computer Security , vol.648 , pp. 329-347
    • Kang, I.E.1    Keefe, T.F.2
  • 21
    • 0026306024 scopus 로고
    • A single-level scheduler for the replicated architecture for multilevel-secure databases
    • San Antonio, TX, December
    • [MJS91] John McDermott, Sushil Jajodia, and Ravi Sandhu. A single-level scheduler for the replicated architecture for multilevel-secure databases. In Seventh Annual Computer Security Application Conference, pages 2-11, San Antonio, TX, December 1991.
    • (1991) Seventh Annual Computer Security Application Conference , pp. 2-11
    • McDermott, J.1    Jajodia, S.2    Sandhu, R.3
  • 22
    • 85031753869 scopus 로고
    • Efficient and flexible methods for transient versioning of records to avoid locking by read-only transactions
    • San Diego, CA, June
    • [MPL92] C. Mohan, Hamid Pirahesh, and Raymond Lorie. Efficient and flexible methods for transient versioning of records to avoid locking by read-only transactions. In Proceedings of ACM SIGMOD International Conference on Management of Data, pages 124-133, San Diego, CA, June 1992.
    • (1992) Proceedings of ACM SIGMOD International Conference on Management of Data , pp. 124-133
    • Mohan, C.1    Pirahesh, H.2    Lorie, R.3
  • 24
    • 0023011968 scopus 로고
    • On-the-fly, incremental, consistent reading of entire databases
    • October
    • [Pu86] Calton Pu. On-the-fly, incremental, consistent reading of entire databases. Algorithmica, 1(3):271-287, October 1986.
    • (1986) Algorithmica , vol.1 , Issue.3 , pp. 271-287
    • Calton, Pu.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.