메뉴 건너뛰기




Volumn , Issue , 1993, Pages 10-23

The concurrency control and recovery problem for multilevel update transactions in MLS systems

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); DISTRIBUTED COMPUTER SYSTEMS; SCHEDULING; SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS;

EID: 84974757243     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.1993.246642     Document Type: Conference Paper
Times cited : (5)

References (21)
  • 1
    • 84976728043 scopus 로고
    • Concurrency control performance modeling: Alternatives and implications
    • [ACL 87] Dec
    • [ACL 87] R. Agrawal, M.J. Carey, and M. Livny, "Concurrency Control Performance Modeling: Alternatives and Implications,"A CM Transactions on Database Systems, 12(4) (Dec. 1987), pp. 609-654.
    • (1987) A CM Transactions on Database Systems , vol.12 , Issue.4 , pp. 609-654
    • Agrawal, R.1    Carey, M.J.2    Livny, M.3
  • 5
    • 0022807172 scopus 로고
    • The performance of multiversion concurrency control algorithms
    • [CM 86] Nov
    • [CM 86] M.J. Carey and W.A. Muhanna, "The Performance of Multiversion Concurrency Control Algorithms," ACM Transactions on Computer Systems, 4(4) (Nov. 1986), pp. 338-378.
    • (1986) ACM Transactions on Computer Systems , vol.4 , Issue.4 , pp. 338-378
    • Carey, M.J.1    Muhanna, W.A.2
  • 6
    • 0026853330 scopus 로고
    • A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture
    • [CM 92] Oakland, CA, May
    • [CM 92] O. Costich and J. McDermott, "A Multilevel Transaction Problem for Multilevel Secure Database Systems and Its Solution for the Replicated Architecture," Proc. of the 1992 IEEE Symp. on Research in Security and Privacy, Oakland, CA, May 1992, pp.192-203.
    • (1992) Proc. of the 1992 IEEE Symp. on Research in Security and Privacy , pp. 192-203
    • Costich, O.1    McDermott, J.2
  • 7
    • 85032179268 scopus 로고
    • Maintaining multilevel transaction atomicity in MLS database systems with kernelized architecture
    • [CJ 92] Vancouver, Canada, Aug.
    • [CJ 92] O. Costich and S. Jajodia, "Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture," Proc. IFIP WG 11.3 6th Working Conference on Database Security, Vancouver, Canada, Aug. 1992, pp. 253-270.
    • (1992) Proc. IFIP WG 11.3 6th Working Conference on Database Security , pp. 253-270
    • Costich, O.1    Jajodia, S.2
  • 8
    • 0020766588 scopus 로고
    • Using semantic knowledge for transaction processing in a distributed database
    • [Garcia 83] June
    • [Garcia 83] H. Garcia-Molina, "Using Semantic Knowledge for Transaction Processing in a Distributed Database," ACM Transactions on Database Systems, 8(2) (June 1983), pp. 186-213.
    • (1983) ACM Transactions on Database Systems , vol.8 , Issue.2 , pp. 186-213
    • Garcia-Molina, H.1
  • 11
    • 0023292465 scopus 로고
    • Extending the noninterference version of MLS for sat
    • [HY 87] Feb.
    • [HY 87] J.T. Haigh and W.D. Young, "Extending the Noninterference Version of MLS for SAT," IEEE Transactions on Software Engineering, SE-13(2) (Feb. 1987), pp. 141-150.
    • (1987) IEEE Transactions on Software Engineering , vol.SE-13 , Issue.2 , pp. 141-150
    • Haigh, J.T.1    Young, W.D.2
  • 12
    • 0025137221 scopus 로고
    • Transaction processing in multilevel-secure databases using replicated architecture
    • [JK 90] Oakland, CA, May
    • [JK 90] S. Jajodia and B. Kogan, "Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture," Proc. of the 1990 IEEE Symp. on Research in Security and Privacy, Oakland, CA, May 1990, pp. 369-383.
    • (1990) Proc. of the 1990 IEEE Symp. on Research in Security and Privacy , pp. 369-383
    • Jajodia, S.1    Kogan, B.2
  • 14
    • 0002197205 scopus 로고
    • A formal approach to recovery by compensating transactions
    • [KLS 90] Brisbane, Australia
    • [KLS 90] H.F. Korth, E. Levy, and A. Silberschatz, "A Formal Approach to Recovery by Compensating Transactions," Proc. of the 16th VLDB Conference, Brisbane, Australia, 1990, pp. 95-106.
    • (1990) Proc. of the 16th VLDB Conference , pp. 95-106
    • Korth, H.F.1    Levy, E.2    Silberschatz, A.3
  • 18
    • 0024925378 scopus 로고
    • Finite-state noiseless covert channels
    • [Millen 89] Franconia, New Hampshire, June
    • [Millen 89] J.K. Millen, "Finite-State Noiseless Covert Channels," Proc. of the Computer Security Foundations Workshop II, Franconia, New Hampshire, June 1989, pp. 81-86.
    • (1989) Proc. of the Computer Security Foundations Workshop II , pp. 81-86
    • Millen, J.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.