Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency.
Isaac C. SheffTom MagrinoJed LiuAndrew C. MyersRobbert van RenessePublished in: CCS (2016)
Keyphrases
- trade off
- correctness criterion
- security requirements
- correctness criteria
- concurrency control protocols
- snapshot isolation
- concurrency control
- security issues
- concurrent execution
- security level
- real time database systems
- security mechanisms
- multilevel secure
- security measures
- transaction management
- key management
- security properties
- electronic transactions
- transaction processing
- security protocols
- security analysis
- information security
- data encryption
- security architecture
- integrity constraints
- transaction processing systems
- data security
- security management
- security services
- key agreement protocol
- diffie hellman
- access control
- electronic voting
- cryptographic protocols
- scheduling problem
- sensitive data
- security model
- authentication protocol
- distributed databases
- key exchange protocol
- transaction model
- stream cipher
- security patterns
- authentication mechanism
- trusted computing
- public key encryption
- user authentication
- authentication scheme
- smart card
- intrusion detection
- multidatabase systems
- scheduling algorithm
- resource constraints
- digital rights management
- replicated data
- distributed database systems
- security policies
- update propagation
- key exchange
- linear logic
- private key
- replicated databases
- encryption scheme
- key agreement
- database
- database systems
- distributed systems
- integrity verification
- public key
- resource constrained
- high scalability
- data replication
- key distribution
- read only transactions
- database management systems
- elliptic curve