enter search term and/or author name
A nested transaction model for multilevel secure database management systems
Elisa Bertino, Barbara Catania, Elena Ferrari
This article presents an approach to concurrency control for transactions in a Multilevel Secure Database Management System (MLS/DBMS). The major problem is that concurrency control mechanisms used in traditional DBMSs are not adequate in a MLS/DBMS,...
The SecureRing group communication system
Kim Potter Kihlstrom, L. E. Moser, P. M. Melliar-Smith
Secure reliable group communication protocols can facilitate the development of survivable distributed systems that are able to remain correct and reliable despite intrusions that cause some nodes to behave in an arbitrary or malicious manner....
Abstraction-based intrusion detection in distributed environments
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
Abstraction is an important issue in intrusion detection, since it not only hides the difference between heterogeneous systems, but also allows generic intrusion-detection models. However, abstraction is an error-prone process and is not well...
An authorization model for a public key management service
Pierangela Samarati, Michael K. Reiter, Sushil Jajodia
Public key management has received considerable attention from both the research and commercial communities as a useful primitive for secure electronic commerce and secure communication. While the mechanics of certifying and revoking public keys and...