Results 101 to 110 of about 13,471 (161)
Some of the next articles are maybe not open access.

Related searches:

Securely executing multilevel transactions

Computers & Security, 1996
In this paper, we show how arbitrary multilevel transactions—transactions that have the ability to read and write data at multiple levels—can be executed using the inherently secure low-first algorithm. To this end, we combine a trusted caching facility with a multiversion timestamp ordering algorithm in a manner that is both secure and yields one-copy
Sushil Jajodia   +3 more
openaire   +2 more sources

Multilevel secure transaction processing

Journal of Computer Security, 2001
Since 1990, transaction processing in multilevel secure database management systems (DBMSs) has been receiving a great deal of attention from the security community. Transaction processing in these systems requires modification of conventional scheduling algorithms and commit protocols.
Jajodia, Sushil   +4 more
openaire   +1 more source

Multidimensional Secure Multilevel Polarization Shift Keying

Fiber and Integrated Optics, 2016
We investigate a technique to improve the information confidentiality in optical fiber telecommunications. Starting from a basic scheme of unconventional coding technique [1] applied to a three-dimensional polarization shift keying, we extend the method to a four-dimensional physical space [2] to demonstrate the general applicability of the ...
G.G. Rutigliano, S. Betti, P. Perrone
openaire   +1 more source

Multilevel Security Policies

2011
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive ...
Cuppens, Frédéric   +1 more
openaire   +3 more sources

Multilevel security: reprise

IEEE Security & Privacy Magazine, 2004
Multilevel security is the prevention of unauthorized disclosure among multiple information classes. The threat source for the disclosures includes unauthorized users and subverted software operating on behalf of authorized users. The terminology might be more explicit if we could call this concept multidomain confidentiality, but it is worth resisting
openaire   +1 more source

Home - About - Disclaimer - Privacy