Multilevel secure transaction processing
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users.
In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention.
Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing.
3 pages matching TCSEC in this book
Results 1-3 of 3
What people are saying - Write a review
We haven't found any reviews in the usual places.
Advanced Database Application Domains
TRANSACTION PROCESSING IN MLS DATABASES
8 other sections not shown
abort application approach atomic commit atomicity buffer management policies buffer page buffer pool buffer slots chapter clearance transactions commit protocol compensating task components Computer Computer Security concurrency control protocols constraints coordinator covert channel database management system Database Security Database Systems DBMS deadline disk dominated enforced example high priority high security level high transaction high-to-low dependency IEEE inter-level levelwise serializability low data item low security level low transaction lower level mandatory access control mechanism messages miss percentage MLS DBMS multilevel secure databases multilevel transaction multiversion node optimistic concurrency control Proc read operation real-time concurrency control Real-Time Database real-time performance replicated architecture requests requirements restarted S2PL SABRE scheduler secure concurrency control Secure Real-Time secure transaction processing security level transaction serializability serialization shown in figure snapshot algorithms solutions subtransactions Sushil Jajodia TCSEC timestamp ordering transaction manager transaction models Trojan Horse untrusted update version period WFMS write