SCHEDULING THE ACCESS TO MULTI-LEVEL SECURE DATABASES IN A WIRELESS NETWORK ENVIRONMENT

被引:0
|
作者
Chen, Patrick S. [1 ]
Li, Shing-Han [1 ]
Liu, Yung-Kuei [1 ]
机构
[1] Tatung Univ, Dept Informat Management, Taipei 104, Taiwan
关键词
Wireless communication; Database security; Scheduling; Altruistic locking; Priority; MODEL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To enhance scheduling efficiency and data security, we propose a Priority/MLS/AL framework for supporting transaction scheduling in wireless environments. In this framework, we divide users into three priority levels and data objects into four security levels. Mobile stations used in the experiments are cellular phones, personal digital assistants, laptops and personal computers. Altruistic locking is used as a mechanism for reserving data objects. We adopt an algorithmic approach to implement the system. The system behavior is simulated, showing that the framework proposed will enhance scheduling performance and data security. Better access control is achieved and deadlocks are avoided.
引用
收藏
页码:5381 / 5403
页数:23
相关论文
共 50 条
  • [1] A model theoretic semantics for multi-level secure deductive databases
    Jamil, HM
    Dobbie, G
    LOGICS PROGRAMMING, PROCEEDINGS, 2002, 2401 : 130 - 147
  • [2] A multi-level view model for secure object-oriented databases
    BaraaniDastjerdi, A
    Pieprzyk, J
    SafaviNaini, R
    DATA & KNOWLEDGE ENGINEERING, 1997, 23 (02) : 97 - 117
  • [3] Scheduling in a Secure Wireless Network
    Wang, Xuan
    Chen, Yi
    Cai, Lin
    Pan, Jianping
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2184 - 2192
  • [4] A multi-level validation methodology for wireless network applications
    Drosos, C
    Bisdounis, L
    Metafas, D
    Blionas, S
    Tatsaki, A
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2004, 3254 : 332 - 341
  • [5] Multi-level job scheduling in a flexible job shop environment
    Na, Hongbum
    Park, Jinwoo
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2014, 52 (13) : 3877 - 3887
  • [6] A Multi-Level Secure File Sharing Server and its Application to a Multi-Level Secure Cloud
    Heckman, Mark R.
    Schell, Roger R.
    Reed, Edwards E.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 1224 - 1229
  • [7] AFOPT algorithm for multi-level databases
    Gyorödi, R
    Gyorödi, C
    Pater, M
    Boc, O
    David, Z
    Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, Proceedings, 2005, : 129 - 133
  • [8] Multi-level secure multicast: The rethinking of secure locks
    Scheikl, O
    Lane, J
    Boyer, R
    Eltoweissy, M
    2002 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS OF THE WORKSHOPS, 2002, : 17 - 24
  • [9] Multi-Level Secure JTAG Architecture
    Pierce, Luke
    Tragoudas, Spyros
    2011 IEEE 17TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2011,
  • [10] Multi-Layer Encryption for multi-level access control in Wireless Sensor Networks
    Teng, Po-Yuan
    Huang, Shih-I
    Perrig, Adrian
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 705 - 709