{"title":"使用时间戳排序维护安全策略的一致性","authors":"S. Ngamsuriyaroj, A. Hurson, T. Keefe","doi":"10.1109/ITCC.2002.1000381","DOIUrl":null,"url":null,"abstract":"In this paper we propose an invalidation-based consistency protocol using timestamp ordering for concurrency control. The protocol works for a system composed of a security server and object managers located on different machines. The security server defines the security policy in a small database and object managers enforce the policy replicated on each machine. Thus, the system can be modeled as a replicated database. Since transient inconsistency among replicas may lead to unauthorized accesses, our goal of consistency is one-copy serializability (1SR) because it guarantees a one-copy view of the security policy regardless of which copy is accessed. However the requirement for good performance is also desirable. We evaluate the performance of the proposed protocol and compare it with the performance of the transactional consistency protocol, an invalidation-based consistency protocol based on a locking mechanism. Both protocols guarantee 1SR consistency. The results show that both protocols demonstrate compatible performance. However the proposed protocol offers 1SR consistency with less overhead.","PeriodicalId":115190,"journal":{"name":"Proceedings. International Conference on Information Technology: Coding and Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Maintaining consistency of the security policy using timestamp ordering\",\"authors\":\"S. Ngamsuriyaroj, A. Hurson, T. Keefe\",\"doi\":\"10.1109/ITCC.2002.1000381\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we propose an invalidation-based consistency protocol using timestamp ordering for concurrency control. The protocol works for a system composed of a security server and object managers located on different machines. The security server defines the security policy in a small database and object managers enforce the policy replicated on each machine. Thus, the system can be modeled as a replicated database. Since transient inconsistency among replicas may lead to unauthorized accesses, our goal of consistency is one-copy serializability (1SR) because it guarantees a one-copy view of the security policy regardless of which copy is accessed. However the requirement for good performance is also desirable. We evaluate the performance of the proposed protocol and compare it with the performance of the transactional consistency protocol, an invalidation-based consistency protocol based on a locking mechanism. Both protocols guarantee 1SR consistency. The results show that both protocols demonstrate compatible performance. However the proposed protocol offers 1SR consistency with less overhead.\",\"PeriodicalId\":115190,\"journal\":{\"name\":\"Proceedings. International Conference on Information Technology: Coding and Computing\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. International Conference on Information Technology: Coding and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITCC.2002.1000381\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Conference on Information Technology: Coding and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCC.2002.1000381","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Maintaining consistency of the security policy using timestamp ordering
In this paper we propose an invalidation-based consistency protocol using timestamp ordering for concurrency control. The protocol works for a system composed of a security server and object managers located on different machines. The security server defines the security policy in a small database and object managers enforce the policy replicated on each machine. Thus, the system can be modeled as a replicated database. Since transient inconsistency among replicas may lead to unauthorized accesses, our goal of consistency is one-copy serializability (1SR) because it guarantees a one-copy view of the security policy regardless of which copy is accessed. However the requirement for good performance is also desirable. We evaluate the performance of the proposed protocol and compare it with the performance of the transactional consistency protocol, an invalidation-based consistency protocol based on a locking mechanism. Both protocols guarantee 1SR consistency. The results show that both protocols demonstrate compatible performance. However the proposed protocol offers 1SR consistency with less overhead.