Data replication in DTPS has several implications for the security of the system. This approach is being explored in several ongoing research efforts, including the Naval Research Laboratory Secure Information through replicated architecture (SINTRA) project (Thuraisingham, 1987). One proposed architecture for MLS/TPS is the replicated architecture. An effective TPS system serves to maintain the ACIDity properties (i.e., atomicity, consistency, isolation, and durability) of transactions and must be superimposed on the preexisting local TPSs (Gray & Reuter, 1993). A DTPS integrates information from the local TPS and presents remote users with transparent methods to use the total information in the system. Each of these TPSs is controlled by a transaction management software layer and can be accessed both remotely and locally. While most of the techniques for TPS security are developed for traditional centralized TPSs, more TPS researchers are making sub stantial contributions to the development of a distributed TPS (Getta, 2003 Haraty, 1999 Haraty & Rahal, 2002 O’Connor & Gray, 1988).Ī DTPS is a collection of a finite number of TPSs connected by a computer network (Ozsu & Valduriez, 1999). These architectures are known as the integrity lock architecture, the kernelized architecture, and the data distribution architecture (Air Force Studies Board, 1983). There are three interesting architectures that have been used to build MLS/TPSs from untrusted ones. In an MLS/TPS, users are assigned classification levels that we denote by “clearances,” and data items are assigned sensitivity levels. Several commercial and military applications require a multilevel secure transaction-processing system (MLS/TPS). Then, in the next section, future trends are presented. In the fifth section, a multilevel secure distributed transaction-processing system is presented. In the fourth section, security-related issues are discussed. Then, next, an overview of a distributed transaction-processing system is presented. The next section provides some background. In this work, we address the issues of achieving a multilevel secure DTPSs system and discuss the security constraints and the replication of data items. We address the issues of achieving a multilevel secure DTPS, and discuss the security constraints and data replication. The security policies and integrity constraints adopted at each site may result in global security having inconsistent states. Properties of a DTPS, such as data replication, may have a substantial effect on the security of the system. Each of these transaction-processing systems is controlled by a software layer and can be accessed both remotely and locally. A distributed transaction-processing system (DTPS) is a collection of a finite number of centralized transaction-processing systems connected by a computer network. In this article, we address the issues of multilevel security in distributed transaction-processing systems. However, the approaches to the issues associated with using TPS in multilevel secure environments are still in the research stage. Transaction-processing systems (TPS) are becoming increasingly more available as commercial products.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |