Results 111 to 120 of about 13,471 (161)
Some of the next articles are maybe not open access.
Multilevel secure database concurrency control
[1990] Proceedings. Sixth International Conference on Data Engineering, 2002The implications of multilevel security on database concurrency control are explored. Transactions are vital for multilevel secure database management systems (MLS/DBMSs) because they provide transparency to concurrency and to failure. Concurrent execution of transactions may lead to contention among subjects for access to data, which in MLS/DBMSs may ...
T.F. Keefe, W.T. Tsai, J. Srivastava
openaire +1 more source
Processing Multilevel Secure Objects
1981 IEEE Symposium on Security and Privacy, 1981The paper describes an architecture for processing multilevel objects in a multilevel secure environment, and discusses the inherent problems involved. A multilevel intelligent terminal is proposed as a practical application for the proposed architecture.
openaire +1 more source
Multilevel security for IP routing
MILCOM 2008 - 2008 IEEE Military Communications Conference, 2008This paper presents a multilevel security (MLS) scheme for routing information. Based on an unprotected IP network, MLS routers may establish logical networks that fulfill different sets of security requirements. We describe a routing scheme for separation of routing information into different security classes derived from multiple levels of integrity,
Eli Winjum, Tore J. Berg
openaire +1 more source
Improved multilevel security with latent semantic indexing [PDF]
Multilevel security (MLS) is specifically created to protect information from unauthorized access. In MLS, documents are assigned to a security label by a trusted subject e.g. an authorized user and based on this assignment; the access to documents is allowed or denied.
D. THORLEUCHTER, D. VAN DEN POEL
openaire +1 more source
Multilevel Object Security Model.
1986Abstract : This report is a summary of the Multilevel Object Security Model (MOSM) project. The MOSM effort involved the development of an intermediate-level security model which satisfies the requirements of the Bell-Lapadula model and the NRL model, while incorporating the ease of verification of the Bell-Lapadula model and the flexibility of the ...
Norman Proctor +2 more
openaire +1 more source
Multilevel secure database management systems
7th Computers in Aerospace Conference, 1989This paper explains three approaches to multilevel security in database management systems. Brief descriptions are given of the integrity lock, TCB subset, and monolithic approaches, with some discussion as to their relative strengths and weaknesses.
LINDA VETTER, BILL MAIMONE
openaire +1 more source
On Logical Foundations of Multilevel Secure Databases
Journal of Intelligent Information Systems, 2004zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jamil, Hasan M., Dobbie, Gillian
openaire +1 more source
Secure Concurrency Control Algorithm for MultiLevel Secure Databases
Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), 2013In a Multi Level Database (MLS) data as well as user, both are classified in order to provide security to data. Data and users are classified at different levels in the database and the user with a particular security level is allowed to access the data at that level or below that level only. So the concurrency control requirements of MLS databases are
S. Shanwal, S. Kumar
openaire +1 more source
Analysis of Security Models Based on Multilevel Security Policy
2012 International Conference on Management of e-Commerce and e-Government, 2012The core of the multilevel security policy is to divide information into different security levels, and to adopt different protection measures according to the security level. This policy is widely used in military field and business environment. This paper introduces three information security models based on multilevel security policy Bell-La Padula (
Jing Jin, Meihui Shen
openaire +1 more source
Security approach for rapid prototyping in multilevel secure systems
[1989 Proceedings] Fifth Annual Computer Security Applications Conference, 2003Use of rapid prototyping to develop Multilevel Secure (MLS) systems requires that security be included in the rapid prototyping process. The literature shows some examples of rapid prototyping applied to secure components. However, little guidance is available for using a rapid prototype to develop an MLS system, consisting of multiple components, that
V.A. Ashby, T. Gregg, A. Lee
openaire +1 more source

