Multilevel Secure Transaction ProcessingInformation security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing. |
Contents
2 | 28 |
4 | 35 |
SECURE TRANSACTION PROCESSING IN REAL | 47 |
234 | 60 |
Workflow Standards | 66 |
2 | 75 |
SECURE BUFFER MANAGEMENT | 81 |
APPLICATIONS TO HIERARCHICAL | 94 |
CHALLENGES | 105 |
Other editions - View all
Multilevel Secure Transaction Processing Vijay Atluri,Sushil Jajodia,Binto George No preview available - 2011 |
Multilevel Secure Transaction Processing Vijay Atluri,Sushil Jajodia,Binto George No preview available - 2012 |
Common terms and phrases
abort application approach Atluri atomic commit atomicity Bell-LaPadula model buffer management policies buffer page buffer pool buffer slots chapter clearance level clearance transactions commit protocol compensating task components Computer concurrency control protocol coordinator covert channel database management system database systems deadline disk distributed transaction dominated enforced example graph high priority high security level high transaction high-to-low dependency implementation inter-level levelwise serializability low data item low security level low transaction lower level mandatory access control mechanism messages miss percentage MLS DBMS multilevel secure databases multilevel transaction multiversion node pinned priority inversion proposed queue read operation real-time concurrency control real-time performance requests requirements restarted S2PL SABRE scheduler Secure Real-Time secure transaction processing security level transaction serialization shown in figure snapshot algorithms solutions subtransactions Sushil Jajodia T₁ T₂ TCSEC TeamWARE timestamp ordering transaction manager transaction models Trojan Horse untrusted update users version period WFMS write