期刊文献+

安全的乐观实时并发控制策略 被引量:1

A Secure Optimistic Real-time Concurrency Control Strategy
下载PDF
导出
摘要 首先在分析嵌入式实时数据库安全要求的基础上,给出了一个三层安全控制模型。然后提出一种安全乐观并发控制策略。该策略采取向前验证策略检查是否发生冲突,当事务执行到验证阶段,当可能出现违背安全要求时,则分别计算提交或夭折被验证事务所引起违背安全及实时要求的严重程度,以决定是否提交或夭折被验证事务。该策略具有较大的灵活性,用户可根据系统的安全要求和实时特征动态调整产生隐通道严重程度及超截止期严重程度的权值以适应不同要求。 This passage bulids a secure control model with three layers on the ERTDB security requirements firstly, and then proposes a secure optimistic concurrency control strategy. It takes FV(Forward Validation) strategy to test the conflict. In the validation phase, when there will be a security conflict, we calculate the violation severity of security and timeless respectively which proceeded from aborting or committing the validating transaction , and then makes decision according to the result. This strategy is comparatively flexible, users can adjust the weight of covert channel and missing deadline severity dynamically so as to meet different timeless and security requirement of the system.
出处 《微计算机应用》 2006年第4期503-506,共4页 Microcomputer Applications
基金 国防武器装备顾先研究项目(413150403) 国防预研基金项目(51415030203JW05) 中国博士后科学基金项目(2003034482) 华中科技大学博士后科学基金项目(2003021)资助
关键词 嵌入式实时数据库 数据库安全 并发控制 embedded real--time database, database security, concurrency control
  • 相关文献

参考文献6

  • 1David,R.Son,S.H.Mukkamala,R.Supporting security requirements in multilevel real-time database,In Proceedings of IEEE Symposium on Security and Privacy,1995,8~10
  • 2Son,S.H.Chaney,C.Thomlinson,N.P.Partial security policies to support timeliness in secure real-time databases,In Proceedings of IEEE Symposium on Security and Privacy,1998,3~6
  • 3George,B.Haritsa,J.Secure transaction processing in firm real-time database systems,ACM SIGMOD Record,1997,26(2):462~473
  • 4Kim,J.Firm real-time optimistic concurrency control algorithms for replicated database systems,In Proceedings of the Sixth International Conference Real-Time Computing Systems and Applications,1999,13~15
  • 5王丽娜,费如纯,董晓梅.等级系统中的访问控制方案研究[J].电子学报,2003,31(2):290-293. 被引量:7
  • 6Ahmed,Q.N.Vrbsky,S.V.Maintaining security in firm real-time database systems,In Proceedings of the 14th Annual Computer Security Applications Conference,1998:7~11

二级参考文献9

  • 1Richard L Burden J Douglas Faires.Numerical Analysis(Seventh Edition),数值分析(第七版影印版)[M].北京:高等教育出版社,2001..
  • 2BSchneier.应用密码学——协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 3S G Akl, P D Taylor. Cryptographic solution to a problem of access in a hierarchy[ J]. ACM trans. Compute. Syst. 1983,1 (3) :239 - 248.
  • 4S J Mackinnon, P D Taylor. An optimal algorithm for assigning cryptographic keys to access control in a hierarchy [ J ]. IEEE Trans. Compute. 1985,34(9) :797 - 802.
  • 5C C Chang, R J Hwang. Cryptographic key assignment scheme for access control in a hierarchy [ J ]. Information Systems, 1992, 17( 3 ) : 243- 247.
  • 6A Shamir. How to share a secret [ J ]. Communications of the ACM,1979,22( 1 ) :612 - 613.
  • 7R L Rivest. The MD4 message digest algorithm[A]. Advances in Cryptology--CRYPTO'90 Proceedings [ C ]. Springer-Verlag, 1991. 303 -311.
  • 8R L Rivest. The MD5 message digest algorithm[ A]. RFC 1321 [C].1992.
  • 9许春香,陈恺,肖国镇.安全的矢量空间秘密共享方案[J].电子学报,2002,30(5):715-718. 被引量:23

共引文献6

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部