Transaction Processing Environment Kernelized Architecture in Multilevel Secure Application Policies

Jaychand Vishwakarma


Multilevel security poses many challenging problems for transaction processing. The challenges are due to the conflicting requirements imposed by confidentiality, integrity, and availability} the three components of security. We identify these requirements on transaction processing in Multilevel Secure (MLS) database management systems (DBMSs) and survey the efforts of a number of researchers to meet these requirements .While our emphasis on centralized system based on kernelized Architecture, we briefly overview the research in the distributed MLS DBMSs as well.

Full Text:



Information Security: An Integrated Collection of Essays, M.D.Abrams, S. Jajodia, and H.J.Podell, eds., IEEE CS Press, Los Alamitos, Calif., 1995.

P. Ammann and S. Jajodia,”A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases,” Database Security: Status and Prospects,” C. Landwehr and S. Jajodia, eds., Amsterdam: North-Holland, pp. 23-25, 1992.

P. Ammann and S. Jajodia,”Planer Lattice Security Structures for Multilevel Replicated Database,” T.F. Keefe and C.E. Landwehr, eds., Database Security VII: Status and Prospects, pp. 125–134. Amsterham: North-Holland, 1994.

P. Ammann, S. Jajodia, and P. Frankl, ”Globally Consistent Event Ordering in One-DirectionalDistributed Environments,” IEEE Trans. Parallel and Distributed Systems, vol. 7, no. 6, pp. 665 670,June 1996.

V. Atluri, E. Bertino, and S. Jajodia, ”Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols,” Database Security VIII: Status and Prospects, J. Biskup, M. Morgenstern, and C.E. Landwehr, eds., pp. 259–274. Amsterdam: North-Holland, 1995.

V. Atluri, S. Jajodia, and E. Bertino, ”Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases,” IEEE Trans. Knowledge and Data Eng., vol. 8, no. 5, pp. 839–854, Oct. 1996.

D.E. Bell and L.J. LaPadula, ”Secure Computer Systems: Unified Exposition and Multics Interpretation,” Technical Report No. MTR-2997, Mitre Corp., Bedford, Mass., Mar. 1976.

P.A. Bernstein, V. Hadzilacos, and N. Goodman, Concurrency Control and Recovery in Database Systems. Reading, Mass.:Addison-Wesley, 1987

E. Bertino, S. Jajodia, L. Mancini, and I. Ray, “Advanced Transaction Processing in Multilevel Secure File Stores,” IEEE Trans. Knowledge and Data Eng., to appear

Committee on Multilevel Data Management Security, Air Force Studies Board, National Research Council, Multilevel Data Management Security, National Academy Press, Washington, D.C.,Mar. 1983.

O. Costich, ”Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture,”C. Landwehr and S. Jajodia, eds., Database Security V: Status and Prospects, pp. 173–190. Amsterdam: North-Holland, 1992.

D.E. Denning, Cryptography and Data Security. Reading, Mass.:Addison-Wesley, 1982.

Digital Equipment Corp., Digital Time Service Functional Specification,Version T.1.0.5, 1989.

Dept. of Defense Computer Security Center, Trusted Computer System Evaluation Criteria, Dec. 1985.

V. Doshi and S. Jajodia, ”Referential Integrity in Multilevel Secure Database Management Systems,” G.G. Gable and W.J. Caelli, eds.,IT Security: The Need for International Cooperation, pp 359-371. Amsterdam:North-Holland, 1992.

J.N. Gray, R.A. Lorie, G.R. Putzolu, and I.L. Traiger, ”Granularity of Locks and Degrees of Consistency in a Shared Data Base,”G.M. Nijssen, ed., Modeling in Data Base Management Systems,pp. 365-394. Amsterdam: North-Holland, 1976.

J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques.San Mateo, Calif.: Morgan Kaufmann, 1993.

S. Jajodia and V. Atluri, ”Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases,”Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp.216-224, May 1992.

S. Jajodia and B. Kogan, ”Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture,” Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 360-368, May 1990.

S. Jajodia, L. Mancini, and I. Ray, ”Secure Locking Protocols for Multilevel Database Management Systems,” P. Samarati and R. Sandhu, eds., Database Security X: Status and Prospects. London:Chapman & Hall, 1997.

S. Jajodia and C. McCollum, “Using Two-Phase Commit for Crash Recovery in Federated Multilevel Secure Database Management Systems,” Dependable Computing and Fault Tolerant Systems, C.E. Landwehr et al., eds., vol. 8, pp. 365-381. New York: Springer-Verlag, 1993.

S. Jajodia, C.D. McCollum, and B.T. Blaustein, “Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases,” Database Security, VII: Status and Prospects,T.F. Keefe and C.E. Landwehr, eds., pp. 109-121. Amsterdam:North-Holland, 1994.

I.E., Kang and T.F. Keefe, ”Transaction Management for Multilevel Secure Replicated Databases,” J. Computer Security, vol. 3,pp. 115-145, 1995.

I.E., Kang and T.F. Keefe, ”On Transaction Processing for Multilevel Secure Replicated Databases,” Proc. European Symp. Research in Computer Security, Springer-Verlag Lecture Notes in Computer Science, vol. 648, pp. 329–347, Toulouse, France, 1992.

T.F. Keefe and W.T. Tsai, ”Multiversion Concurrency Control for Multilevel Secure Database Systems,” Proc. IEEE Symp. Security and Privacy, Oakland, Calif., pp. 369-383, May 1990.

L. Lamport, ”Concurrent Reading and Writing,” Comm. ACM,vol. 20, no. 11, pp. 806-811,1977.

L. Lamport, ”Time, Clocks, and the Ordering of Events in a Distributed System,” Comm. ACM, vol. 21, no. 7, pp. 558–565, 1978.

C.E. Landwehr, ”Formal Models of Computer Security,” ACM Computing Surveys, vol. 13, no. 3, pp. 247-278, 1981.

B. Liskov, ”Practical Uses of Synchronized Clocks in Distributed Systems,” Proc. 10th ACM Symp. Principles of Distributed Computing, pp. 1-9, Aug. 1991.

B. Maimone and R. Allen, ”Methods for Resolving the Security vs.Integrity Conflict,” Proc. Fourth RADC Database Security Workshop,Little Compton, R.I., Apr. 1991.

W.T. Maimone and I.B. Greenberg, ”Single-Level Multiversion Schedulers for Multilevel Secure Database Systems,” Proc. Sixth Ann. Computer Security Applications Conf., Tucson, Ariz., pp. 137-147, Dec. 1990.

D. McCullough, ”A Hookup Theorem for Multilevel Security,”IEEE Trans. Software Eng., vol. 16, no. 6, pp. 563-568, June 1990.

J. McDermott and S. Jajodia, “Orange Locking: Channel-Free Database Concurrency Control via Locking,” Database Security, VI: Status and Prospects, B.M. Thuraisingham and C.E. Landwehr, eds. pp. 267–284. Amsterdam: North-Holland, 1993.

C. Meadows and S. Jajodia, “Integrity vs. Security in Multi-Level Secure Databases,” C.E. Landwehr, ed., Database Security, Status, and Prospects, pp. 89-101. Amsterdam: North-Holland, 1988.

D.L. Mills, Network Time Protocol (Version 3) Specification, Implementation, Analysis, DARPA Networking Group Report, July 1990.

C. Mohan, B. Lindsay, and R. Obermarck,”Transaction Management in the R**Distributed Database Management System,” ACM Trans. Database Systems, vol. 11, no. 4, pp. 378-396, Dec. 1986.

I. Ray, E. Bertino, S. Jajodia, and L. Mancini, ”An Advanced Commit Protocol for MLS Distributed Database Systems,” Proc.Third ACM Conf. Computer and Comm. Security, New Delhi, India, pp. 119–128, Mar. 1996.

D.P. Reed and R.K. Kanodia, ”Synchronization with Event Counts and Sequencers,” Comm. ACM, vol. 22, no. 5, pp. 115-123, Feb. 1979.

M. Schaefer, ”Quasi-Synchronization of Readers and Writers in a Secure Multi-Level Environment,” Technical Report No. TM-5407/003, System Development Corp., Sept. 1974.

J.W. Stamos and F. Cristian, ”Coordinator Log Transaction Execution Protocol,” Distributed and Parallel Databases, vol. 1, pp. 383-408, 1993.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.