Multilevel Secure Transaction Processing (häftad)
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
126
Utgivningsdatum
2012-10-11
Upplaga
Softcover reprint of the original 1st ed. 2000
Förlag
Springer-Verlag New York Inc.
Medarbetare
Jajodia, Sushil / George, Binto
Illustrationer
XIV, 126 p.
Dimensioner
234 x 156 x 8 mm
Vikt
213 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9781461370550

Multilevel Secure Transaction Processing

Häftad,  Engelska, 2012-10-11
1765
  • Skickas från oss inom 7-10 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Finns även som
Visa alla 2 format & utgåvor
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designed to store, retrieve and process information in compliance with certain mandatory security requirements, essential for protecting sensitive information from unauthorized access, modification and abuse. Such systems are characterized by data objects labeled at different security levels and accessed by users cleared to those levels. Unless transaction processing modules for these systems are designed carefully, they can be exploited to leak sensitive information to unauthorized users. In recent years, considerable research has been devoted to the area of multilevel secure transactions that has impacted the design and development of trusted MLS DBMS products. Multilevel Secure Transaction Processing presents the progress and achievements made in this area. The book covers state-of-the-art research in developing secure transaction processing for popular MLS DBMS architectures, such as kernelized, replicated, and distributed architectures, and advanced transaction models such as workflows, long duration and nested models. Further, it explores the technical challenges that require future attention. Multilevel Secure Transaction Processing is an excellent reference for researchers and developers in the area of multilevel secure database systems and may be used in advanced level courses in database security, information security, advanced database systems, and transaction processing.
Visa hela texten

Passar bra ihop

  1. Multilevel Secure Transaction Processing
  2. +
  3. Microeconomics

De som köpt den här boken har ofta också köpt Microeconomics av Paul Krugman, Wells Robin (häftad).

Köp båda 2 för 2784 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Övrig information

Vijay Atluri is an Assistant Professor of Computer Information Systems and Member of the Center for Information Management, Integration and Connectivity in the Management Science and Information Systems Department at Rutgers University, Newark, NJ, USA Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA

Innehållsförteckning

1. Introduction.- 1 Multilevel Secure Databases.- 2 Advanced Database Application Domains.- 3 Organization of the book.- 2. Traditional Transaction Processing.- 1 ACID Requirements.- 2 Concurrency Control Protocols.- 3 Commit Protocols.- 3. Transaction Processing in Mls Databases.- 1 Problems with solutions in traditional environment.- 2 Revised Requirements.- 3 Commercial Solutions.- 4 Research Solutions for Replicated Architecture.- 5 Research Solutions for Kernelized Architecture.- 4. Secure Transaction Processing in Real-Time Databases.- 1 Introduction to Real-Time Databases.- 2 Additional Requirements.- 3 Concurrency Control.- 4 Conclusions.- 5. Secure Workflow Transaction Processing.- 1 Introduction to Workflow Systems.- 2 Workflow Transaction Model.- 3 Multilevel Secure Workflow Model.- 4 Solutions to Execute MLS Workflows.- 5 The MLS WFMS Architecture.- 6. Secure Buffer Management.- 1 Introduction to Buffer Management.- 2 Requirements.- 3 Solutions.- 4 Secure Real-Time Database Buffer Management.- 5 Conclusions.- 7. Applications to Hierarchical and Replicated Databases.- 1 Hierarchical Databases.- 2 Replicated Databases.- 8. Challenges.- 1 Using advanced transaction model paradigms.- 2 Secure Long Duration Transaction Processing.- 3 Recovery Methods.- References.