Multilevel secure transaction processing

被引:0
|
作者
Jajodia, S. [1 ]
Atluri, V. [1 ]
Keefe, T.F. [1 ]
McCollum, C.D. [1 ]
Mukkamala, R. [1 ]
机构
[1] Ctr. for Secure Informations Systems, Dept. Info. and Software Syst. Eng., George Mason University, Fairfax, VA 22030-4444, United States
关键词
Algorithms - Concurrency control - Database systems - Network protocols - Scheduling - Theorem proving;
D O I
10.3233/JCS-2001-9301
中图分类号
学科分类号
摘要
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the security community. Transaction processing in these systems requires modification of conventional scheduling algorithms and commit protocols. These modifications are necessary because preserving the usual transaction properties when transactions are executing at different security levels often conflicts with the enforcement of the security policy. Considerable effort has been devoted to the development of efficient, secure algorithms for the major types of secure DBMS architectures: kernelized, replicated, and distributed. An additional problem that arises uniquely in multilevel secure DBMSs is that of secure, correct execution when data at multiple security levels must be written within one transaction. Significant progress has been made in a number of these areas, and a few of the techniques have been incorporated into commercial trusted DBMS products. However, there are many open problems remain to be explored. This paper reviews the achievements to date in transaction processing for multilevel secure DBMSs. The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and then describes the results of research in multilevel secure transaction processing. Research results and limitations in concurrency control, multilevel transaction management, and secure commit protocols are summarized. Finally, important new areas are identified for secure transaction processing research.
引用
收藏
相关论文
共 50 条