DATABASE CONCURRENCY-CONTROL IN MULTILEVEL SECURE DATABASE-MANAGEMENT SYSTEMS

被引:12
作者
KEEFE, TF [1 ]
TSAI, WT [1 ]
SRIVASTAVA, J [1 ]
机构
[1] UNIV MINNESOTA, DEPT COMP SCI, MINNEAPOLIS, MN 55455 USA
基金
美国国家科学基金会;
关键词
COVERT CHANNEL ANALYSIS; DATABASE CONCURRENCY CONTROL; MULTILEVEL SECURE DATABASE MANAGEMENT SYSTEMS; MULTILEVEL SECURITY; MULTIVERSION CONCURRENCY CONTROL; NONINTERFERENCE;
D O I
10.1109/69.250090
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. Concurrent execution of transactions may lead to contention for access to data, which in a multilevel secure DBMS (MLS/DBMS) may lead to insecurity. In this paper we examine security issues involved in database concurrency control for MLS/DBMSs and show how a scheduler can affect security. We introduce Data Conflict Security, (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. We present a definition of DC-Security based on noninterference. Two properties that constitute a necessary condition for DC-Security are introduced along with two other simpler necessary conditions. We have identified a class of schedulers we call Output-State-Equivalent for which another criterion implies DC-Security. The criterion considers separately the behavior of the scheduler in response to those inputs that cause rollback a:nd those that do not. We characterize the security properties of several existing scheduling protocols and find many to be insecure.
引用
收藏
页码:1039 / 1055
页数:17
相关论文
共 31 条
[1]  
BELL DE, 1976, MTR2997 MITR CORP TE
[2]  
Bernstein P.A., 1987, CONCURRENCY CONTROL
[3]  
COSTICH O, 1991, NOV P IFIP WG 5TH WO
[4]  
Date C.J., 1986, INTRO DATABASE SYSTE, V4th
[5]  
DOWNING AR, 1989, 5TH P AN COMP SEC AP, P196
[6]  
Gasser M., 1988, BUILDING SECURE COMP
[7]  
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[8]  
GUGUEN JA, 1984, P IEEE S SECURITY PR, P75
[9]   AN EXPERIENCE USING 2 COVERT CHANNEL ANALYSIS TECHNIQUES ON A REAL SYSTEM-DESIGN [J].
HAIGH, JT ;
KEMMERER, RA ;
MCHUGH, J ;
YOUNG, WD .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :157-168
[10]   EXTENDING THE NONINTERFERENCE VERSION OF MLS FOR SAT [J].
HAIGH, JT ;
YOUNG, WD .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :141-150