Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing.
Les mer
Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing.
Les mer
1. Introduction.- 1 Multilevel Secure Databases.- 2 Advanced Database Application Domains.- 3 Organization of the book.- 2. Traditional Transaction Processing.- 1 ACID Requirements.- 2 Concurrency Control Protocols.- 3 Commit Protocols.- 3. Transaction Processing in Mls Databases.- 1 Problems with solutions in traditional environment.- 2 Revised Requirements.- 3 Commercial Solutions.- 4 Research Solutions for Replicated Architecture.- 5 Research Solutions for Kernelized Architecture.- 4. Secure Transaction Processing in Real-Time Databases.- 1 Introduction to Real-Time Databases.- 2 Additional Requirements.- 3 Concurrency Control.- 4 Conclusions.- 5. Secure Workflow Transaction Processing.- 1 Introduction to Workflow Systems.- 2 Workflow Transaction Model.- 3 Multilevel Secure Workflow Model.- 4 Solutions to Execute MLS Workflows.- 5 The MLS WFMS Architecture.- 6. Secure Buffer Management.- 1 Introduction to Buffer Management.- 2 Requirements.- 3 Solutions.- 4 Secure Real-Time Database Buffer Management.- 5 Conclusions.- 7. Applications to Hierarchical and Replicated Databases.- 1 Hierarchical Databases.- 2 Replicated Databases.- 8. Challenges.- 1 Using advanced transaction model paradigms.- 2 Secure Long Duration Transaction Processing.- 3 Recovery Methods.- References.
Les mer
Springer Book Archives
GPSR Compliance
The European Union's (EU) General Product Safety Regulation (GPSR) is a set of rules that requires consumer products to be safe and our obligations to ensure this.
If you have any concerns about our products you can contact us on ProductSafety@springernature.com.
In case Publisher is established outside the EU, the EU authorized representative is:
Springer Nature Customer Service Center GmbH
Europaplatz 3
69115 Heidelberg, Germany
ProductSafety@springernature.com
Les mer
Produktdetaljer
ISBN
9780792377023
Publisert
1999-11-30
Utgiver
Vendor
Springer
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, UU, UP, P, 05, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet