Role-Based Serializability for Distributed Object Systems

  • Youhei Tanaka
  • Tomoya Enokido
  • Makoto Takizawa
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4080)


In the role-based access control model, a role is a set of access rights. A subject doing jobs is granted roles showing the jobs in an enterprise. A transaction issued by a subject is associated with a subset of roles granted to the subject, which is named purpose. A method with a more significant purpose is performed before another method with a less significant purpose. We discuss which purpose is more significant than another purpose. We discuss two types of role-ordering (RO) schedulers SRO and PRO where multiple conflicting transactions are serializable in the significant order of subjects and purposes, respectively. We evaluate the RO schedulers compared with the traditional two-phase locking protocol in terms of throughput.


Computation Ratio Access Control Model Issue Method Object Request Broker Purpose Point 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)Google Scholar
  2. 2.
    Denning, D.E., Denning, P.J.: Cryptography and Data Security. Addison-Wesley Publishing Company, Reading (1982)MATHGoogle Scholar
  3. 3.
    Enokido, T., Takizawa, M.: Concurrency Control Based-on Significancy on Roles. In: Proc. of the IEEE 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), pp. 196–202 (2005)Google Scholar
  4. 4.
    Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role Based Access Control. Artech House (2005)Google Scholar
  5. 5.
    Gray, J.: Notes on Database Operating Systems. LNCS, vol. 60, pp. 393–481. Springer, Heidelberg (1978)Google Scholar
  6. 6.
    O.M.G. Inc.: The Common Object Request Broker : Architecture and Specification. Rev. 2.1 (1997)Google Scholar
  7. 7.
    Oracle Corporation.: Oracle8i Concepts Vol. 1. Release 8.1.5 (1999)Google Scholar
  8. 8.
    Sandhu, R.S.: Lattice-Based Access Control Models. IEEE Computer 26(11), 9–19 (1993)Google Scholar
  9. 9.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)Google Scholar
  10. 10.
    Sybase.: Sybase SQL Server,
  11. 11.
    Tari, Z., Chan, S.W.: A Role-Based Access Control for Intranet Security. IEEE Internet Computing 1, 24–34 (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Youhei Tanaka
    • 1
  • Tomoya Enokido
    • 2
  • Makoto Takizawa
    • 1
  1. 1.Tokyo Denki UniversityJapan
  2. 2.Rissho UniversityJapan

Personalised recommendations