Advertisement

Mark-and-sweep garbage collection in multilevel secure object-oriented database systems

  • Alessandro Ciampichetti
  • Elisa Bertino
  • Luigi Mancini
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 875)

Abstract

In this paper, the introduction of garbage collection techniques in a multilevel secure object-oriented database system is discussed; in particular, the attention is focused on mark-and-sweep collectors. A secure garbage collection scheme guarantees referential integrity and avoids potential covert channels arising from object deletion.

Keywords

object-oriented database systems mandatory access control garbage collection object deletion mark-and-sweep 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bell D., LaPadula L., “Secure Computer Systems: Unified Exposition and Multics Interpretation”, Technical Report ESD-TR-75-306, MTR-2997, MITRE, Bedford, Massachusetts, 1975.Google Scholar
  2. 2.
    Bertino E., Mancini L. V., Jajodia S., “Collecting Garbage in Multilevel Secure Object Stores”, Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May 1994.Google Scholar
  3. 3.
    Chokhani S., “Trusted Products Evaluation”, Comm. of the ACM, vol. 35, no. 7, July, 1992, pp. 66–76.Google Scholar
  4. 4.
    Ciampichetti A., “Object Deletion and Garbage Collection in Secure Object-Oriented DBMSs”, (in Italian), Master Thesis, Department of Computer Science, University of Genova, Italy, October 1993.Google Scholar
  5. 5.
    Denning D. E., “Cryptography and Data Security”, Addison Wesley Editions, Reading, Massachusetts, 1982.Google Scholar
  6. 6.
    Department of Defense, “Trusted Computer System Evaluation Criteria”, DOD 5200.28-STD, Washington DC, Usa, December 1985.Google Scholar
  7. 7.
    Deux O., et al., “The Story of O 2”, IEEE Transactions on Knowledge and Data Engineering, vol. 2, no. 1, 1990, pp. 91–108.CrossRefGoogle Scholar
  8. 8.
    Kim W., et al., “Architecture of the ORION Next-Generation Database System”, IEEE Transactions on Knowledge and Data Engineering, vol. 2, no. 1, 1990, pp. 109–124.CrossRefGoogle Scholar
  9. 9.
    Kang H. M., Moskowitz I. S., “A Pump for Rapid, Reliable, Secure Communication”, 1st ACM Conf. — Computer and Comm. Security, pp. 119–129, Va, Usa, November 1993.Google Scholar
  10. 10.
    Kolodner E., Liskov B., Weihl W., “Atomic Garbage Collection: Managing a Stable Heap”, Proc. ACM-SIGMOD International Conference on Management of Data, Boston, Oregon, May–June 1989.Google Scholar
  11. 11.
    Jajodia S., Kogan B., “Integrating an Object-Oriented Data Model with Multilevel Security”, Proc. 1990 IEEE Computer Society Symp. on Research in Security and Privacy, May 1990.Google Scholar
  12. 12.
    Lieberman H., Hewitt C., “A real-time Garbage Collector based on the Lifetime of Objects”, Comm. of the ACM, Vol. 26, No. 6, June 1983.Google Scholar
  13. 13.
    Maier D., et al., “Development of an Object-Oriented DBS”, Proc. OOPSLA 1st Conference, Portland, Oregon, October 1986.Google Scholar
  14. 14.
    Maimone W. T., Greenberg I. B., “Single-Level Multiversion Schedulers for Multilevel Secure Database Systems”, Proc. IEEE Computer Society Symp. on Research in Security and Privacy, Oakland, California, May 1990.Google Scholar
  15. 15.
    Mancini L. V., Shrivastava S. K., “Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems”, The Computer Journal, vol. 34, no. 6, 1991.Google Scholar
  16. 16.
    Millen J. K., Lunt T. F., “Security for Object-Oriented Database Systems”, Proc. IEEE Computer Society Symp. on Research in Security and Privacy, Oakland, California, May 1992.Google Scholar
  17. 17.
    Rabitti F., Bertino E., Kim W., Woelk D., “A Model of Authorization for Object-Oriented and Semantic Database Systems”, ACM Transactions on Database Systems, vol. 16, no. 1, March 1991.Google Scholar
  18. 18.
    Schorr H., Waite W. M., “An Efficient Machine-Independent Procedure for Garbage Collection in Various List Structures”, Comm. of the ACM, vol. 10, n. 8, pp. 501–506, 1967.CrossRefGoogle Scholar
  19. 19.
    Shockly W. R., Schell R. R., “TCB Subsets for Incremental Evaluation”, Proc. 2nd AIAA Conference on Computer Security, December 1987.Google Scholar
  20. 20.
    Thorelli L. E., “Marking Algorithms”, Bit, vol. 12, n. 4, pp. 555–568, 1972.Google Scholar
  21. 21.
    Thorelli L. E., “A Fast Compactifying Garbage Collector”, Bit, vol. 16, n. 4, pp. 426–441, 1976.Google Scholar
  22. 22.
    Zorn B., “Comparing Mark-and-Sweep and Stop-and-Copy Garbage Collection”, Comm. of the ACM, 1990, pp. 87–98.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • Alessandro Ciampichetti
    • 1
  • Elisa Bertino
    • 2
  • Luigi Mancini
    • 1
  1. 1.Dipartimento di Informatica e Scienze dell'InformazioneUniversità di GenovaGenevaItaly
  2. 2.Dipartimento di Scienze dell'InformazioneUniversità di MilanoMilanoItaly

Personalised recommendations