Skip to main content

Secure Transaction Processing in Multi-expert Systems with Replicated Data

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2003)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2774))

  • 1245 Accesses

Abstract

The most important issue in expert security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of knowledge base. In this paper, we consider the security environment of multi expert system with replicated data. The read from relationship in the existed is improper in security environment. So, we define new read-from relationship and propose new secure one copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure one copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pfleeger, C.P.: Security in Computing, pp. 249–250. Prentice Hall, Englewood Cliffs (1989)

    Google Scholar 

  2. Castano, S.: Database Security, pp. 82–86. Addison-Wesley, Reading (1994)

    Google Scholar 

  3. Du, W., et al.: Supporting Consistent Updates in Replicated Multi expert Systems. VLDB, Journal #2, 215–241 (1993)

    Google Scholar 

  4. Du, W., Elmagarmid, A.: Maintaining Quasi Serializability in Multi expert Systems. In: Proceedings, 7th International Conference on Data Engineering, pp. 360–367 (1991)

    Google Scholar 

  5. Jing, J., Du, W., Elmagarmid, A., Bukhres, O.: Maintaining Consistency of Replicated Data in Multi expert Systems, pp. 552–559. IEEE, Los Alamitos (1994)

    Google Scholar 

  6. Jajodia, S., Kogan, B.: Transaction Processing in Multil-evel Secure Databases Using Replicated Architecture. In: Proceedings, Symposium on Security and Privacy, pp. 360–368 (1990)

    Google Scholar 

  7. Kang, M.H., Costich, O., Froscher, J.N.: A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. In: Thuraising ham, B.M., Landwehr, C.E. (eds.) Database Security VI: Status and Prospects (A-21), pp. 285–300. Elsevier Science Publishers B.V, North-Holland, IFIP (1993)

    Google Scholar 

  8. Costich, O.: Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture. In: Landwehr, C.E., Jajodia, S. (eds.) Database Security V: Status and Prospects, pp. 173–189. Elsevier Science Publishers B.V., North-Holland, IFIP (1992)

    Google Scholar 

  9. Kang, E., Keefe, T.F.: Concurrency Control for Federated Multilevel Secure Database Systems. In: 8th IEEE Computer Security Foundations Workshop, pp. 118–135 (1995)

    Google Scholar 

  10. Sandhu, R.: Lattice-Based Access Control Models. IEEE Computer, 9–19 (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hyun-Cheol, J., Lee, M., Cho, B. (2003). Secure Transaction Processing in Multi-expert Systems with Replicated Data. In: Palade, V., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2003. Lecture Notes in Computer Science(), vol 2774. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45226-3_114

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45226-3_114

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40804-8

  • Online ISBN: 978-3-540-45226-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics