Abstract. Many real-time database applications arise in electronic financial services, safety-critical installations and military systems where enforcing security is crucial to the success of the enterprise. We investigate here the perfor-mance implications, in terms of killed transactions, of guar-anteeing multi-level secrecy in a real-time database system supporting applications with firm deadlines. In particular, we focus on the buffer management aspects of this issue. Our main contributions are the following. First, we iden-tify the importance and difficulties of providing secure buffer management in the real-time database environment. Second, we present SABRE, a novel buffer management algorithm that provides covert-channel-free securi...
Database systems for real-time applications must satisfy timing constraints associated with transact...
We present a mechanism for communication from low to high security classes that allows partial ackno...
In today’s world, data is generated at a very rapid speed and final destination of such data is the ...
Many real-time database applications arise in electronic financial services, safety-critical install...
Abstract. Many real-time database applications arise in electronic financial services, safety-critic...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in safety-critical installations and military systems whe...
Database systems for real-time applications must satisfy timing constraints associated with transact...
The privacy of information is an increasing concern of software applications users. This concern was...
Real-Time, active database systems (RTADBs) have attracted the attention of researchers in recent ti...
elements within the existing system. We are also examining inclusion of run-time estimates for vario...
We present a mechanism for communication from low to high security classes that allows partial ackno...
Database systems for real-time applications must satisfy timing constraints associated with transact...
We present a mechanism for communication from low to high security classes that allows partial ackno...
In today’s world, data is generated at a very rapid speed and final destination of such data is the ...
Many real-time database applications arise in electronic financial services, safety-critical install...
Abstract. Many real-time database applications arise in electronic financial services, safety-critic...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in safety-critical installations and military systems whe...
Database systems for real-time applications must satisfy timing constraints associated with transact...
The privacy of information is an increasing concern of software applications users. This concern was...
Real-Time, active database systems (RTADBs) have attracted the attention of researchers in recent ti...
elements within the existing system. We are also examining inclusion of run-time estimates for vario...
We present a mechanism for communication from low to high security classes that allows partial ackno...
Database systems for real-time applications must satisfy timing constraints associated with transact...
We present a mechanism for communication from low to high security classes that allows partial ackno...
In today’s world, data is generated at a very rapid speed and final destination of such data is the ...