Multilevel secure transaction processing

被引:0
|
作者
Jajodia, S. [1 ]
Atluri, V. [1 ]
Keefe, T.F. [1 ]
McCollum, C.D. [1 ]
Mukkamala, R. [1 ]
机构
[1] Ctr. for Secure Informations Systems, Dept. Info. and Software Syst. Eng., George Mason University, Fairfax, VA 22030-4444, United States
关键词
Algorithms - Concurrency control - Database systems - Network protocols - Scheduling - Theorem proving;
D O I
10.3233/JCS-2001-9301
中图分类号
学科分类号
摘要
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the security community. Transaction processing in these systems requires modification of conventional scheduling algorithms and commit protocols. These modifications are necessary because preserving the usual transaction properties when transactions are executing at different security levels often conflicts with the enforcement of the security policy. Considerable effort has been devoted to the development of efficient, secure algorithms for the major types of secure DBMS architectures: kernelized, replicated, and distributed. An additional problem that arises uniquely in multilevel secure DBMSs is that of secure, correct execution when data at multiple security levels must be written within one transaction. Significant progress has been made in a number of these areas, and a few of the techniques have been incorporated into commercial trusted DBMS products. However, there are many open problems remain to be explored. This paper reviews the achievements to date in transaction processing for multilevel secure DBMSs. The paper provides an overview of transaction processing needs and solutions in conventional DBMSs as background, explains the constraints introduced by multilevel security, and then describes the results of research in multilevel secure transaction processing. Research results and limitations in concurrency control, multilevel transaction management, and secure commit protocols are summarized. Finally, important new areas are identified for secure transaction processing research.
引用
收藏
相关论文
共 50 条
  • [21] Advanced transaction scheduling protocol for multilevel secure database in wireless mobile network environment
    Kim, HW
    Park, DS
    Rhee, HK
    Kim, UM
    JOINT 4TH IEEE INTERNATIONAL CONFERENCE ON ATM (ICATM'01) AND HIGH SPEED INTELLIGENT INTERNET SYMPOSIUM, 2001, : 240 - 244
  • [22] STAR: Secure real-time transaction processing with timeliness guarantees
    Kang, KD
    Son, SH
    Stankovic, JA
    23RD IEEE REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, 2002, : 303 - 314
  • [23] Secure transaction processing in multi-expert systems with replicated data
    Hyun-Cheol, J
    Lee, M
    Cho, B
    KNOWLEDGE-BASED INTELLIGNET INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2003, 2774 : 834 - 840
  • [24] RCC: Resilient Concurrent Consensus for High-Throughput Secure Transaction Processing
    Gupta, Suyash
    Hellings, Jelle
    Sadoghi, Mohammad
    2021 IEEE 37TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2021), 2021, : 1392 - 1403
  • [25] Secure Transaction Authentication Protocol
    Pourghomi, Pardis
    Saeed, Muhammad Qasim
    Abi-Char, Pierre E.
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 261 - 273
  • [26] Properties of secure transaction protocols
    Steves, DH
    Edmondson-Yurkanan, C
    Gouda, M
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1997, 29 (15): : 1809 - 1821
  • [27] SHARON: Secure and Efficient Cross-shard Transaction Processing via Shard Rotation
    Jiang, Shan
    Cao, Jiannong
    Tung, Cheung Leong
    Wang, Yuqin
    Wang, Shan
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 2418 - 2427
  • [28] TRANSACTION PROCESSING
    不详
    BYTE, 1993, 18 (09): : 184 - 185
  • [29] Transaction processing
    Curley, C
    DR DOBBS JOURNAL, 2004, 29 (03): : 73 - +
  • [30] MULTILEVEL SECURE RULES - INTEGRATING THE MULTILEVEL SECURE AND ACTIVE DATA MODELS
    SMITH, K
    WINSLETT, M
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 21 : 35 - 53