did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780792377023

Multilevel Secure Transaction Processing

by ; ;
  • ISBN13:

    9780792377023

  • ISBN10:

    0792377028

  • Format: Hardcover
  • Copyright: 1999-10-01
  • Publisher: Kluwer Academic Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $199.99 Save up to $146.33
  • Digital
    $116.27
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing.

Author Biography

Vijay Atluri is an Assistant Professor of Computer Information Systems and Member of the Center for Information Management, Integration and Connectivity in the Management Science and Information Systems Department at Rutgers University, Newark, NJ, USADr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Table of Contents

List of Figures
ix
List of Tables
xi
Preface xiii
Introduction
1(14)
Multilevel Secure Databases
2(10)
Why DAC is not enough?
4(2)
Additional Threats to Security: Covert Channels
6(2)
Multilevel Secure DBMS Architectures
8(4)
Advanced Database Application Domains
12(1)
Organization of the book
13(2)
Traditional Transaction Processing
15(6)
ACID Requirements
15(1)
Concurrency Control Protocols
16(2)
Commit Protocols
18(3)
Transaction Processing in MLS Databases
21(22)
Problems with solutions in traditional environment
21(2)
Revised Requirements
23(1)
Commercial Solutions
24(1)
Research Solutions for Replicated Architecture
25(2)
Research Solutions for Kernelized Architecture
27(16)
Single version algorithms
27(1)
Multiversion algorithms
28(1)
Keefe-Tsai's scheduler
29(1)
Jajodia-Atluri's scheduler
29(1)
Snapshot Approaches
30(1)
Weaker Correctness Criteria
31(1)
Levelwise Serializability
31(2)
One-item Read Serializability
33(1)
Pairwise Serializability
34(1)
Using Transaction Analysis to Achieve Serializability
35(1)
Multilevel Transactions
36(1)
Secure Commit Protocols
37(2)
Secure Early Prepare (SEP)
39(4)
Secure Transaction Processing in Real-Time Databases
43(20)
Introduction to Real-Time Databases
44(3)
Priority Assignment Policies
47(1)
Additional Requirements
47(1)
Secure Priority Assignment
47(1)
Concurrency Control
48(13)
Real-Time protocols
48(1)
2PL High Priority
49(1)
OPT-SACRIFICE
49(1)
OPT-WAIT
50(1)
Performance Evaluation
50(2)
Adaptive Secure 2PL (AS2PL)
52(2)
Dual Approach
54(2)
S2PL-WAIT
56(1)
Secure Real-Time Two-Phase Locking Protocol
56(3)
Fairness
59(2)
Conclusions
61(2)
Secure Workflow Transaction Processing
63(18)
Introduction to Workflow Systems
64(3)
Workflow Technology and Products
64(1)
Workflow Product Categories
65(1)
Workflow Standards
66(1)
Workflow Transaction Model
67(2)
Multilevel Secure Workflow Model
69(1)
Solutions to Execute MLS Workflows
70(9)
Semantic Classification of Task Dependencies in MLS workflows
71(4)
Redesigning of MLS Workflows
75(1)
Splitting the High Task:
75(1)
Running a Compensating Task
76(2)
Summary of the Redesigning Process
78(1)
Alternative Solutions: Maintaining Multiple Versions:
78(1)
The MLS WFMS Architecture
79(2)
Secure Buffer Management
81(14)
Introduction to Buffer Management
81(1)
Requirements
82(1)
Solutions
83(5)
&est;-DBS Buffering System
84(1)
Buffer Allocation
84(1)
Replacement
85(1)
Synchronization
85(1)
Design Issues
86(1)
Implementation
87(1)
Performance Analysis
87(1)
Secure Real-Time Database Buffer Management
88(5)
Secure Buffering Algorithm for RTDBS
88(1)
Security Features
89(1)
Real-Time Features
89(1)
Search and Slot Selection
90(1)
Fairness Features
91(1)
Performance Study
91(2)
Conclusions
93(2)
Applications to Hierarchical and Replicated Databases
95(10)
Hierarchical Databases
95(4)
Hsu-Chan Protocol
97(1)
Ammann et al. Protocol
97(2)
Replicated Databases
99(6)
Challenges
105(6)
Using advanced transaction model paradigms
105(2)
Secure Long Duration Transaction Processing
107(2)
Recovery Methods
109(2)
References 111(12)
Index 123

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program