SCHEDULING THE ACCESS TO MULTI-LEVEL SECURE DATABASES IN A WIRELESS NETWORK ENVIRONMENT

被引:0
|
作者
Chen, Patrick S. [1 ]
Li, Shing-Han [1 ]
Liu, Yung-Kuei [1 ]
机构
[1] Tatung Univ, Dept Informat Management, Taipei 104, Taiwan
关键词
Wireless communication; Database security; Scheduling; Altruistic locking; Priority; MODEL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To enhance scheduling efficiency and data security, we propose a Priority/MLS/AL framework for supporting transaction scheduling in wireless environments. In this framework, we divide users into three priority levels and data objects into four security levels. Mobile stations used in the experiments are cellular phones, personal digital assistants, laptops and personal computers. Altruistic locking is used as a mechanism for reserving data objects. We adopt an algorithmic approach to implement the system. The system behavior is simulated, showing that the framework proposed will enhance scheduling performance and data security. Better access control is achieved and deadlocks are avoided.
引用
收藏
页码:5381 / 5403
页数:23
相关论文
共 50 条
  • [31] Connectors in a multi-level modeling environment
    Atkinson, Colin
    ICSOFT 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL SE/GSDCA/MUSE, 2008, : 301 - 301
  • [32] Multi-level Scheduling Algorithm Based on Storm
    Wang, Jie
    Hang, Siguang
    Liu, Jiwei
    Chen, Weihao
    Hou, Gang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (03): : 1091 - 1110
  • [33] Multi-level lotsizing and scheduling by batch sequencing
    Jordan, C
    Koppelmann, J
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 1998, 49 (11) : 1212 - 1218
  • [34] OM Algorithm for Multi-level Queue Scheduling
    Hasija, Manupriya
    Kaushik, Akhil
    Kumar, Parveen
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 564 - 568
  • [35] MMLQ Algorithm for Multi-level Queue Scheduling
    Hasija, Manupriya
    Kaushik, Akhil
    Kaushik, Satvika
    Barnela, Manoj
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (07): : 90 - 94
  • [36] NEW APPROACH TO MULTI-LEVEL PROCESSOR SCHEDULING
    Semnani, Samaneh Hosseini
    Zamanifar, Kamran
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS, 2010, 19 (03) : 335 - 346
  • [37] Multi-level hashing for peer-to-peer system in wireless ad hoc environment
    Ahmed, Dewan Tanvir
    Shirmohammadi, Shervin
    FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2007, : 126 - +
  • [38] Co-Optimization of Memory Access and Task Scheduling on MPSoC Architectures with Multi-Level Memory
    He, Yi
    Xue, Chun Jason
    Xu, Cathy Qun
    Sha, Edwin H. -M.
    2010 15TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2010), 2010, : 93 - +
  • [39] Multi-level design validation in a secure embedded system
    Hwang, DD
    Schaumont, P
    Yang, SL
    Verbauwhede, I
    HLDVT'05: TENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2005, : 203 - 210
  • [40] Reducing the risk of multi-level secure (MLS) workstations
    Klinker, JE
    Mihelcic, DM
    MILCOM 97 PROCEEDINGS, VOLS 1-3, 1997, : 1422 - 1426