Modern applications often operate on data in multiple administrative domains. In this federated setting, participants may not fully trust each other. These distributed applications use transactions as a core mechanism for ensuring reliability and consistency with persistent data. However, the coordination mechanisms needed for transactions can both leak confidential information and allow unauthorized influence. By implementing a simple attack, we show these side channels can be exploited. However, our focus is on preventing such attacks. We explore secure scheduling of atomic, serializable transactions in a federated setting. While we prove that no protocol can guarantee security and liveness in all settings, we establish condition...
Serializability is a key property for executions of OLTP sys-tems; without this, integrity constrain...
Abstract The controlled declassification of secrets has received much attention in research on infor...
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been...
AbstractThe purpose of a database concurrency control is to allow only serializable executions of tr...
Many real-time database applications arise in safety-critical installations and military systems whe...
International audienceHigh-security processes have to load confidential information into shared reso...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
To sidestep reasoning about the complex effects of concurrent execution, many system designers have ...
International audienceSome cryptographic tasks, such as contract signing and other related tasks, ne...
The controlled declassification of secrets has received much attention in research on information-fl...
We are entering an era in which federated information systems are widely used to share information a...
Abstract. Some cryptographic tasks, such as contract signing and other related tasks, need to ensure...
Abstract. Some cryptographic tasks, such as contract signing and other related tasks, need to ensure...
Abstract — In the recent past, Security-sensitive applications, such as electronic transaction proc...
Serializability is a key property for executions of OLTP sys-tems; without this, integrity constrain...
Abstract The controlled declassification of secrets has received much attention in research on infor...
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been...
AbstractThe purpose of a database concurrency control is to allow only serializable executions of tr...
Many real-time database applications arise in safety-critical installations and military systems whe...
International audienceHigh-security processes have to load confidential information into shared reso...
Many real-time database applications arise in electronic financial services, safety-critical install...
Many real-time database applications arise in electronic financial services, safety-critical install...
To sidestep reasoning about the complex effects of concurrent execution, many system designers have ...
International audienceSome cryptographic tasks, such as contract signing and other related tasks, ne...
The controlled declassification of secrets has received much attention in research on information-fl...
We are entering an era in which federated information systems are widely used to share information a...
Abstract. Some cryptographic tasks, such as contract signing and other related tasks, need to ensure...
Abstract. Some cryptographic tasks, such as contract signing and other related tasks, need to ensure...
Abstract — In the recent past, Security-sensitive applications, such as electronic transaction proc...
Serializability is a key property for executions of OLTP sys-tems; without this, integrity constrain...
Abstract The controlled declassification of secrets has received much attention in research on infor...
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been...