Multilevel Secure Transaction ProcessingInformation security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing. |
Other editions - View all
Multilevel Secure Transaction Processing Vijay Atluri,Sushil Jajodia,Binto George Limited preview - 2012 |
Multilevel Secure Transaction Processing Vijay Atluri,Sushil Jajodia,Binto George No preview available - 2011 |
Multilevel Secure Transaction Processing Vijay Atluri,Sushil Jajodia,Binto George No preview available - 2012 |
Common terms and phrases
abort application approach atomic commit atomicity Bell-LaPadula model buffer management buffer management policies buffer page buffer pool buffer slots clearance transactions commit protocol compensating task components Computer Security concurrency control protocols constraints coordinator covert channel Database Security Database Systems DBMS deadline disk dominated enforced ensure example high security level high transaction high-to-low dependency IEEE inter-level levelwise serializability low data item low security level low transaction lower level mandatory access control mechanism messages miss percentage MLS DBMS multilevel secure databases multilevel transaction multiversion node partition Proc read operation real-time concurrency control Real-Time Database real-time performance replicated architecture requests requirements restarted S2PL SABRE scheduler secret secure concurrency control Secure Real-Time secure transaction processing security level transaction serializability serialization shown in figure snapshot algorithms solutions subtransactions Sushil Jajodia T₁ T₂ timestamp ordering transaction manager transaction models transaction T₁ Trojan Horse untrusted update users WFMS write