R. K. Abbott and H. Garcia-Molina, “Scheduling Real-Time Transactions: A Performance Evaluation”, In ACM Transactions on Database Systems
, 17, pp513–560, 1992.CrossRefGoogle Scholar
D. E. Bell and L. J. LaPadula, “Secure Computer Systems: Unified Exposition and Multics Interpretation”, The Mitre Corp., 1976.
Rasikan David, Sang H. Son and Ravi Mukkamala, “Supporting Security Requirements in Multilevel Real-Time Databases”, In IEEE Symposium on Security and Privacy, Oakland, CA, pp 199–210, 1995.
B. George and J. Haritsa, “Secure Transaction Processing in Firm Real-Time Database System”, In Proceedings of ACM SIGMOD, pp462–473, 1997.
J. R. Haritsa, M. J. Carey, and M. Livny, “Dynamic Real-Time Optimistic Concurrency Control”, In 11
IEEE Real-Time Systems Symposium, 1990.
J. R. Haritsa, M. J. Carey, and M. Livny, “On Being Optimistic about Real-Time”, In Proceedings of the 1990 ACM PODS Symposium, pp331–343, April 1990.
Soek-Hee Hong, Myung-Ho Kim, Yoon-Joon Lee, “Methods of Concurrency Control in Real-Time Database”, In Korean Information Science Society Review
, Vol. 11, No. 1, pp 26–36, 1993.Google Scholar
Thomas F. Keefe, W. T. Tsai, Jaideep Srivastava, “Database Concurrency Control in Multilevel Secure Database Management Systems”, In IEEE Transaction on knowledge and Data Engineering
, vol 5, no. 6, pp1039–1055, 1993.CrossRefGoogle Scholar
Young-kuk Kim and Sang H. Son, “Predictability and Consistency in Real-Time Database Systems”, Advances in Real-Time Systems, S. H. Son (ed.), Prentice Hall, pp 509–531, 1995.
J. Lee and S. H. Son, “Using Dynamic Adjustment of Serialization Order for Real-Time Database Systems”, In 14
IEEE Real-Time Systems Symposium, pp66–75, 1993.
J. Mcdermott and S. Jajodia, “Orange Locking Channel-Free Database Concurrency Control via Locking”, In IFIP WG 11.3 Workshop in Database Security, pp267–284, 1992.
Ira S. Moskowitz and Myong H. Kang, “Covert Channels-Here to Stay?”, In Proceedings of COMPASS 94, pp235–243, 1994.
R. Mukkamala and S. H. Son, “A Secure Concurrency Control Protocol for Real-Time Databases”, In Annual IFIP WG 11.3 Conference of Database Security, Rensselaerville, New York, Aug. pp 235–253, 1995.
Chanjung Park, Seog Park, and Sang H. Son, “Priority-driven Secure Multi-version Locking Protocol for Real-Time Secure Database Systems”, In Proceedings of IFIP 11
Working Conference on Database Security, August 1997.
Chanjung Park and Seog Park, “Alternative Correctness Criteria for Multi-version Concurrency Control and a Locking Protocol via Freezing”, In International Database Engineering and Applications Symposium (IDEA’ 97), pp. 73–81, August 1997.
S. H. Son and R. David, “Design and Analysis of a Secure Two-Phase Locking Protocol,” In 18
International Computer Software and Applications Conference (COMPSAC’94), Taipei, Taiwan, pp 374–379, 1994.
S. H. Son, R. David, and B. Thuraisingham, “An Adaptive Policy for Improved Timeliness in Secure Database Systems”, In Annual IFIP WG 11.3 Conference of Database Security, pp223–233, 1995.