Integrating standard transactions in firm real-time database systems
نویسندگان
چکیده
منابع مشابه
Integrating Standard Transactions in Firm Real-Time Database Systems
Real-time database systems are designed to handle workloads where transactions have completion deadlines and the goal is to meet these deadlines. However, many real-time database environments are characterized by workloads that are a & of real-time and standard (non-real-time) transactions. Unfortunately, the system policies used to meet the performance goals of real-time transactions often wor...
متن کاملOn Integrating Standard Transactions in Real{time Database Systems
Real-time database systems are designed to handle workloads where transactions have completion deadlines and the goal is to meet these deadlines. However, many real-time database environments are characterized by workloads that are a mix of real-time and standard (non-real-time) transactions. Unfortunately, the system policies used to meet the performance goals of real-time transactions often w...
متن کاملIntegrating Standard Transactions in Real-Time Database Systems
Real-time database systems are designed to handle workloads where transactions have completion deadlines and the goal is to meet these deadlines. However, many real-time database environments are characterized by workloads that are a mix of real-time and standard (non-real-time) transactions. Unfortunately, the system policies used to meet the performance goals of real-time transactions often w...
متن کاملSYCYUY Transaction Processing in Firm Real-Time Database Systems
\l,ili\. rc&t;,iiiir~ dat,al);t SII(:(:~SS of the enterprise. A secure real-time (till ill)ilSC' svst,niii hits to simultaneously satisfy two requireIII(YII.~ guarant,ee data security and minimize the number 111’ ttlihs(s(l transnc.t,ion deadlines. We investigate here the ...
متن کاملMaintaining Security in Firm Real-Time Database Systems
Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information, where mandatory access control for security is required. Hence, in addition to timing constraints, real-time database systems have security constraints. Conventional multi-level secure database models are inadequate for time-critica...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Systems
سال: 1996
ISSN: 0306-4379
DOI: 10.1016/s0306-4379(96)00002-6