An extended transaction model approach for multilevel secure transaction processing

被引:0
作者
Atluri, V [1 ]
Mukkamala, R [1 ]
机构
[1] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
来源
DATABASE AND APPLICATION SECURITY XV | 2002年 / 87卷
关键词
multilevel security; transaction processing; advanced transaction model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multilevel secure transaction processing has been well explored in the past decade. Despite this research, the proposed secure concurrency control protocols are not completely satisfactory because of the stringent constraints imposed by multilevel security. In this paper, we argue that modeling a transaction as an extended transaction model could significantly reduce the performance penalty. We accomplish this by minimizing (1) the probability of restarting a high security level transaction; and (2) the portion of the transaction to be reexecuted, when a restart becomes inevitable. In particular, we exploit the non-flat nature of transactions by identifying dependencies among various components of a transaction and portraying a transaction as an advanced transaction model. We demonstrate, via formal proofs, that our approach preserves the semantics of the transaction, and our concurrency control algorithm guarantees serializability.
引用
收藏
页码:255 / 268
页数:14
相关论文
共 12 条
[1]  
AMMANN P, 1998, J COMPUTER SECURITY, V6
[2]  
AMMANN P, 1992, DATABASE SECURITY, V2, P23
[3]  
BEERI C, 1989, J ACM, V36
[4]   Advanced transaction processing in multilevel secure file stores [J].
Bertino, E ;
Jajodia, S ;
Mancini, L ;
Ray, I .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1998, 10 (01) :120-135
[5]  
ELMAGARMID AK, 1992, DATABASE T MODELS AD
[6]  
Jajodia S., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P216, DOI 10.1109/RISP.1992.213259
[7]  
Keefe T. F., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P369, DOI 10.1109/RISP.1990.63865
[8]  
Maimone W. T., 1990, Proceedings of the Sixth Annual Computer Security Applications Conference (Cat. No.90TH0351-7), P137, DOI 10.1109/CSAC.1990.143762
[9]  
MCDERMOTT J, 1992, P 6 IFIP WG 11 3 WOR
[10]  
PANOS K, 1990, P ACM SIGMOD INT C M, P194