Maintaining security in firm real-time database systems

被引:14
作者
Ahmed, QN [1 ]
Vrbsky, SV [1 ]
机构
[1] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
来源
14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS | 1998年
关键词
D O I
10.1109/CSAC.1998.738584
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information where mandatory access control for security is required. Hence, in addition to timing constraints, real-time database systems have security constraints Conventional multi-level secure database models are inadequate for time-critical applications and conventional real-time database models do not support security constraints. The objective of this work is to incorporate security constraints in real-time database systems in such a way that not only is security achieved, but achieving security does not degrade real-time performance significantly in terms of deadlines missed. We propose a new optimistic concurrency control algorithm for secure firm real-time databases. Results show that the algorithm performs fairly well in terms of security and timeliness compared to a non-secure algorithm We argue and show that achieving more security does not necessarily mean more sacrifice in real-time performance.
引用
收藏
页码:83 / 90
页数:8
相关论文
共 14 条
  • [1] SCHEDULING REAL-TIME TRANSACTIONS - A PERFORMANCE EVALUATION
    ABBOTT, RK
    GARCIAMOLINA, H
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 1992, 17 (03): : 513 - 560
  • [2] BELL D, 1974, SECURE COMPUTER SYST
  • [3] DENNING DE, 1988, P IEEE S SEC PRIV OA
  • [4] GEORGE B, 1997, P SIGMOD, P462
  • [5] DATA ACCESS SCHEDULING IN FIRM REAL-TIME DATABASE-SYSTEMS
    HARITSA, JR
    CAREY, MJ
    LIVNY, M
    [J]. REAL-TIME SYSTEMS, 1992, 4 (03) : 203 - 241
  • [6] JAJODIA S, 1991, P ACM SIGMOD DENV CO, P50
  • [7] SCHEDULING ALGORITHMS FOR MULTIPROGRAMMING IN A HARD-REAL-TIME ENVIRONMENT
    LIU, CL
    LAYLAND, JW
    [J]. JOURNAL OF THE ACM, 1973, 20 (01) : 46 - 61
  • [8] Moskowitz I. S., 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.94CH3444-7), P56, DOI 10.1109/RISP.1994.296592
  • [9] TEMPORAL AND REAL-TIME DATABASES - A SURVEY
    OZSOYOGLU, G
    SNODGRASS, RT
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1995, 7 (04) : 513 - 532
  • [10] QIAN X, 1994, P 1994 IEEE S RES SE, P158