Concurrency control on distributed objects using role ordering (RO) scheduler

被引:0
作者
Enokido, T [1 ]
Takizawa, M [1 ]
机构
[1] Tokyo Denki Univ, Dept Comp & Syst Engn, Tokyo, Japan
来源
WORDS 2005: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable, Proceedings | 2005年
关键词
D O I
10.1109/WORDS.2005.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A concept of role is significant to design and implement a secure information system. A role concept shows a job-function in an enterprise. A role-based access control (RBAC) model is used to make a system secure. In addition to keeping systems secure, objects have to be consistent in presence of multiple transactions. Traditional locking protocols and timestamp ordering schedulers are based on principles 'first-comer-winner" and "timestamp order" to make multiple conflicting transactions serializable, respectively. In this paper, we discuss concurrency control algorisms based on the significantly of roles assigned to transactions. We first define a significantly dominant relation on roles. We discuss a role ordering (RO) scheduler so that multiple conflicting transactions are serializable in a significant dominant relation of roles. We evaluate the RO scheduler compared with the two-phase locking (2PL) protocol.
引用
收藏
页码:66 / 73
页数:8
相关论文
共 14 条
[1]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[2]  
[Anonymous], 2006, IEEE COMPUTER
[3]  
[Anonymous], 1993, IEEE Computer
[4]  
Bernstein P.A., 1987, Concurrency Control and Recovery in Database Systems
[5]  
Bertino E., 1993, Proceedings of the 1st ACM conference on Computer and communications security, P140
[6]  
CHON R, 2004, IN PRESS P IEEE 18 I
[7]   LATTICE MODEL OF SECURE INFORMATION-FLOW [J].
DENNING, DE .
COMMUNICATIONS OF THE ACM, 1976, 19 (05) :236-243
[8]  
Ferriaolo David, 1992, P 15 NATL COMP SEC C, P554
[9]  
Gray Jim, 1978, LECT NOTES COMPUTER, V60, P393
[10]  
INC OMG, 1997, COMMON OBJECT REQUES