Abstract
The most important issue in expert security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of knowledge base. In this paper, we consider the security environment of multi expert system with replicated data. The read from relationship in the existed is improper in security environment. So, we define new read-from relationship and propose new secure one copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure one copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pfleeger, C.P.: Security in Computing, pp. 249–250. Prentice Hall, Englewood Cliffs (1989)
Castano, S.: Database Security, pp. 82–86. Addison-Wesley, Reading (1994)
Du, W., et al.: Supporting Consistent Updates in Replicated Multi expert Systems. VLDB, Journal #2, 215–241 (1993)
Du, W., Elmagarmid, A.: Maintaining Quasi Serializability in Multi expert Systems. In: Proceedings, 7th International Conference on Data Engineering, pp. 360–367 (1991)
Jing, J., Du, W., Elmagarmid, A., Bukhres, O.: Maintaining Consistency of Replicated Data in Multi expert Systems, pp. 552–559. IEEE, Los Alamitos (1994)
Jajodia, S., Kogan, B.: Transaction Processing in Multil-evel Secure Databases Using Replicated Architecture. In: Proceedings, Symposium on Security and Privacy, pp. 360–368 (1990)
Kang, M.H., Costich, O., Froscher, J.N.: A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. In: Thuraising ham, B.M., Landwehr, C.E. (eds.) Database Security VI: Status and Prospects (A-21), pp. 285–300. Elsevier Science Publishers B.V, North-Holland, IFIP (1993)
Costich, O.: Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture. In: Landwehr, C.E., Jajodia, S. (eds.) Database Security V: Status and Prospects, pp. 173–189. Elsevier Science Publishers B.V., North-Holland, IFIP (1992)
Kang, E., Keefe, T.F.: Concurrency Control for Federated Multilevel Secure Database Systems. In: 8th IEEE Computer Security Foundations Workshop, pp. 118–135 (1995)
Sandhu, R.: Lattice-Based Access Control Models. IEEE Computer, 9–19 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hyun-Cheol, J., Lee, M., Cho, B. (2003). Secure Transaction Processing in Multi-expert Systems with Replicated Data. In: Palade, V., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2003. Lecture Notes in Computer Science(), vol 2774. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45226-3_114
Download citation
DOI: https://doi.org/10.1007/978-3-540-45226-3_114
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40804-8
Online ISBN: 978-3-540-45226-3
eBook Packages: Springer Book Archive