SCHEDULING THE ACCESS TO MULTI-LEVEL SECURE DATABASES IN A WIRELESS NETWORK ENVIRONMENT

被引:0
|
作者
Chen, Patrick S. [1 ]
Li, Shing-Han [1 ]
Liu, Yung-Kuei [1 ]
机构
[1] Tatung Univ, Dept Informat Management, Taipei 104, Taiwan
关键词
Wireless communication; Database security; Scheduling; Altruistic locking; Priority; MODEL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To enhance scheduling efficiency and data security, we propose a Priority/MLS/AL framework for supporting transaction scheduling in wireless environments. In this framework, we divide users into three priority levels and data objects into four security levels. Mobile stations used in the experiments are cellular phones, personal digital assistants, laptops and personal computers. Altruistic locking is used as a mechanism for reserving data objects. We adopt an algorithmic approach to implement the system. The system behavior is simulated, showing that the framework proposed will enhance scheduling performance and data security. Better access control is achieved and deadlocks are avoided.
引用
收藏
页码:5381 / 5403
页数:23
相关论文
共 50 条
  • [41] Multi-level and Multi-objective Survey on Cloud Scheduling
    Kessaci, Yacine
    Melab, Nouredine
    Talbi, El-Ghazali
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2014, : 481 - 489
  • [42] Multi-level access control for collaborative CAD
    Fang, CH
    Peng, W
    Ye, XZ
    Zhang, SY
    PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS 1 AND 2, 2005, : 643 - 648
  • [43] Multi-Level Modeling of Wireless Embedded Systems
    Li, Fangyan
    Dekneuvel, Eric
    Jacquemod, Gilles
    Quaglia, Davide
    Lora, Michele
    Pecheux, Francois
    Butaud, Remi
    PROCEEDINGS OF THE 2014 FORUM ON SPECIFICATION & DESIGN LANGUAGES (FDL), 2014,
  • [44] Coded Caching for Multi-level Popularity and Access
    Hachem, Jad
    Karamchandani, Nikhil
    Diggavi, Suhas N.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (05) : 3108 - 3141
  • [45] Multi-level Access Control for Geo Contents
    Park, Sun Rae
    Lee, Jong Suk Ruth
    Cho, Kum Won
    Lee, Kyu-Chul
    CONTROL AND AUTOMATION, AND ENERGY SYSTEM ENGINEERING, 2011, 256 : 183 - +
  • [46] Evaluation of audio streaming in secure wireless access network
    Vaidya, B
    Kim, J
    Pyun, J
    Park, J
    Han, S
    ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 828 - 838
  • [47] A Secure Wireless LAN Access Technique for Home Network
    Lee, Ju-A
    Kim, Jae-Hyun
    Park, Jun-Hee
    Moon, Kyung-Duk
    2006 IEEE 63RD VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 818 - +
  • [48] Framework for secure audio streaming to wireless access network
    Vaidya, B
    Kim, JW
    Pyun, JY
    Park, JA
    Han, SJ
    2005 Systems Communications, Proceedings: ICW 2005, WIRELESS TECHNOLOGIES; ICHSN 2005, HIGH SPEED NETWORKS; ICMCS 2005, MULTIMEDIA COMMUNICATIONS SYSTEMS; SENET 2005, SENSOR NETWORKS, 2005, : 122 - 127
  • [49] A multi-level probabilistic neural network
    Zong, Ning
    Hong, Xia
    ADVANCES IN NEURAL NETWORKS - ISNN 2007, PT 2, PROCEEDINGS, 2007, 4492 : 516 - +
  • [50] Multi-Level network security architecture
    Luo, J.Z.
    Liu, Y.Y.
    2001, Chinese Academy of Sciences (12):