Maintaining consistency of the security policy using timestamp ordering

被引:1
|
作者
Ngamsuriyaroj, S [1 ]
Keefe, TF [1 ]
Hurson, AR [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
consistency control; security policy; concurrency control; timestamp ordering; performance;
D O I
10.1109/ITCC.2002.1000381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose an invalidation-based consistency protocol using timestamp ordering for concurrency control. The protocol works for a system composed of a Security Server and Object Managers located on different machines. The Security Server defines the security policy in a small database and Object Managers enforce the policy replicated on each machine. Thus, the system can be modeled as a replicated database. Since transient inconsistency among replicas may lead to unauthorized accesses, our goal of consistency is one-copy serializability (ISR) because is guarantees one-copy view of the security policy regardless of which copy is accessed. However the requirement for good performance is also desirable. We evaluate the performance of the proposed protocol and compare it with the performance of the Transactional Consistency, Protocol, art invalidation-based consistency protocol based on locking mechanism. Both protocols guarantee ISR consistency. The results show that both protocols demonstrate compatible performance. However the proposed protocol offers ISR consistency, with less overhead.
引用
收藏
页码:164 / 170
页数:7
相关论文
共 50 条
  • [1] Maintaining consistency of the security policy in distributed environment
    Ngamsuriyaroj, S
    Keefe, TF
    Hurson, AR
    [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 179 - 186
  • [2] Maintaining Arc Consistency using Adaptive Domain Ordering
    Likitvivatanavong, Chavalit
    Zhang, Yuanlin
    Bowen, James
    Freuder, Eugene C.
    [J]. 19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), 2005, : 1527 - 1528
  • [3] LUC Model : A Timestamp Ordering based View Consistency Model for Distributed Shared Memory
    Rafat, Rubaiyat Islam
    Sakib, Kazi
    [J]. JOURNAL OF COMPUTERS, 2010, 5 (12) : 1828 - 1838
  • [4] Concurrency control using timestamp ordering in broadcast environments
    Lee, VCS
    Lam, KW
    Son, SH
    [J]. COMPUTER JOURNAL, 2002, 45 (04): : 410 - 422
  • [5] Unifying Timestamp with Transaction Ordering for MVCC with Decentralized Scalar Timestamp
    Wei, Xingda
    Chen, Rong
    Chen, Haibo
    Wang, Zhaoguo
    Gong, Zhenhan
    Zang, Binyu
    [J]. PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON NETWORKED SYSTEM DESIGN AND IMPLEMENTATION, 2021, : 357 - 372
  • [6] Formal Analysis of the Security Protocol with Timestamp Using SPIN
    Xiao, Meihua
    Song, Weiwei
    Yang, Ke
    OuYang, Ri
    Zhao, Hanyu
    [J]. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [7] Maintaining Security Consistency During System Development with Security-Oriented Model Federation
    Boudjemila, Chahrazed
    Dagnat, Fabien
    Martinez, Salvador
    [J]. PROCEEDINGS OF THE 2024 INTERNATIONAL CONFERENCE ON SOFTWARE AND SYSTEMS PROCESSES, ICSSP 2024, 2024, : 66 - 76
  • [8] A Novelty Approach for Checking Consistency of Security Policy
    Liu Changhua
    Li Yaqin
    Liao Zhensong
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 319 - +
  • [9] Security Policy: Consistency, Adjustments and Restraining Factors
    Yang Jiemian Research Professor and Deputy Director
    [J]. Contemporary International Relations, 2004, (11) : 33 - 38
  • [10] Shrinking timestamp sizes of event ordering protocols
    Mostéfaoui, A
    Theel, O
    [J]. 1998 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 193 - 200