Maintaining Security in Firm Real-Time Database Systems

نویسندگان

  • Quazi N. Ahmed
  • Susan V. Vrbsky
چکیده

Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information, where mandatory access control for security is required. Hence, in addition to timing constraints, real-time database systems have security constraints. Conventional multi-level secure database models are inadequate for time-critical applications and conventional real-time database models do not support security constraints. The objective of this work is to incorporate security constraints in real-time database systems in such a way that not only is security achieved, but achieving security does not degrade real-time performance significantly in terms of deadlines missed. We propose a new optimistic concurrency control algorithm for secure firm real-time databases. Results show that the algorithm performs fairly well in terms of security and timeliness compared to a non-secure algorithm. We argue and show that achieving more security does not necessarily mean more sacrifice in real-time performance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maintaining security and timeliness in real-time database system

Real-time database systems can have security constraints in addition to timing constraints. Such real-time systems are typically contained in environments that exhibit hierarchical propagation of information, where mandatory access control for security is required. Conventional multi-level secure database models that implement mandatory access control are inadequate for time-critical applicatio...

متن کامل

Satisfying Multiple Constraints in Real-Time Database Systems

Real-time database systems, such as military command, control and communication, avionics, radar tracking, and managing automated factories, have timing constraints and temporal consistency constraints. The timing constraint requires a transaction to be completed by a specified deadline. The temporal consistency constraints require that data read by a transaction be up-to-date. In such environm...

متن کامل

Towards a Multilevel Secure Database Management System for Real-Time Applications

Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time databas...

متن کامل

A Secure Concurrency Control Protocol for Real-Time Databases

Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditio...

متن کامل

Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version

In many real time applications, security is an important requirement, since the system maintains sensitive information to be shared by multiple users with different security levels. A secure real-time database system must satisfy not only logical data consistency but also the timing constraints and security requirements associated with transactions. Even though an optimistic concurrency control...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998