Design and analysis of a secure two-phase locking protocol

Sang H. Son, Rasikan David

Research output: Contribution to journalConference articlepeer-review

25 Scopus citations

Abstract

In addition to maintaining consistency of the database, secure concurrency control algorithms must be free from covert channels arising due to data conflicts between transactions. The existing secure concurrency control approaches are unfair to transactions at higher access classes. In this paper, a secure two-phase locking protocol is presented, which is correct and free from covert channels. The protocol uses three different types of locks to support non-interference property and to provide reasonably fair execution of all transactions, regardless of their access class. The results of a performance evaluation of the protocol are provided, comparing it with secure optimistic concurrency control and secure multiversion timestamp ordering.

Original languageEnglish
Pages (from-to)374-379
Number of pages6
JournalProceedings - IEEE Computer Society's International Computer Software & Applications Conference
StatePublished - 1994
EventProceedings of the 18th Annual International Computer Software & Applications Conference (COMPSAC 94) - Taipei, Taiwan
Duration: 9 Nov 199411 Nov 1994

Fingerprint

Dive into the research topics of 'Design and analysis of a secure two-phase locking protocol'. Together they form a unique fingerprint.

Cite this