Multi-party conflict: the problem and its solutions
Currently there is a great deal of interest concerning polyinstantiation in database management systems (DBMSs). However, polyinstantiation is a specific solution to a problem faced by all secure systems, and the problem itself is not well characterized. The problem stems from the interference betwe...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 231 |
---|---|
container_issue | |
container_start_page | 222 |
container_title | |
container_volume | |
creator | Keefe, T.F. Thomsen, D.J. Tsai, W.T. Hansch, M.R. |
description | Currently there is a great deal of interest concerning polyinstantiation in database management systems (DBMSs). However, polyinstantiation is a specific solution to a problem faced by all secure systems, and the problem itself is not well characterized. The problem stems from the interference between subjects of different security compartments. The authors focus on this problem, which they call multiparty update conflict (MUC). They discuss and evaluate some solutions to the MUC problem, such as polyinstantiation and rigid classification. A framework for a class of MUC solutions based on polyinstantiation is described, and several intermediate solutions between rigid classification and polyinstantiation are enumerated.< > |
doi_str_mv | 10.1109/CSAC.1989.81054 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_81054</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>81054</ieee_id><sourcerecordid>81054</sourcerecordid><originalsourceid>FETCH-LOGICAL-g674-f3916b3bfc7e66ffd94065bc3b7f3d56945f8b57a6042a14498dc8b522923fc23</originalsourceid><addsrcrecordid>eNotj81KAzEYRQMiVGvXxV1eYMYvv5N0Vwa1QsVFuy9JJqkp6cwwSRd9e4t6NwfO4sBFaEmgJgT0S7tbtzXRSteKgOB36BEUUZICSD5Di5xPcJsQCrR4QOzzkkqsRjOVK3ZDH1J0ZYXLt8fjNNjkz9j0HY4l4zykS4lDn5_QfTAp-8U_52j_9rpvN9X26_2jXW-ro2x4FZgm0jIbXOOlDKHTHKSwjtkmsE5IzUVQVjRGAqeGcK5V526CUk1ZcJTN0fNfNnrvD-MUz2a6Hn5PsR-DlkFy</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Multi-party conflict: the problem and its solutions</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Keefe, T.F. ; Thomsen, D.J. ; Tsai, W.T. ; Hansch, M.R.</creator><creatorcontrib>Keefe, T.F. ; Thomsen, D.J. ; Tsai, W.T. ; Hansch, M.R.</creatorcontrib><description>Currently there is a great deal of interest concerning polyinstantiation in database management systems (DBMSs). However, polyinstantiation is a specific solution to a problem faced by all secure systems, and the problem itself is not well characterized. The problem stems from the interference between subjects of different security compartments. The authors focus on this problem, which they call multiparty update conflict (MUC). They discuss and evaluate some solutions to the MUC problem, such as polyinstantiation and rigid classification. A framework for a class of MUC solutions based on polyinstantiation is described, and several intermediate solutions between rigid classification and polyinstantiation are enumerated.< ></description><identifier>ISBN: 0818620064</identifier><identifier>ISBN: 9780818620065</identifier><identifier>DOI: 10.1109/CSAC.1989.81054</identifier><language>eng</language><publisher>IEEE Comput. Soc. Press</publisher><subject>Data security</subject><ispartof>[1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, p.222-231</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/81054$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/81054$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Keefe, T.F.</creatorcontrib><creatorcontrib>Thomsen, D.J.</creatorcontrib><creatorcontrib>Tsai, W.T.</creatorcontrib><creatorcontrib>Hansch, M.R.</creatorcontrib><title>Multi-party conflict: the problem and its solutions</title><title>[1989 Proceedings] Fifth Annual Computer Security Applications Conference</title><addtitle>CSAC</addtitle><description>Currently there is a great deal of interest concerning polyinstantiation in database management systems (DBMSs). However, polyinstantiation is a specific solution to a problem faced by all secure systems, and the problem itself is not well characterized. The problem stems from the interference between subjects of different security compartments. The authors focus on this problem, which they call multiparty update conflict (MUC). They discuss and evaluate some solutions to the MUC problem, such as polyinstantiation and rigid classification. A framework for a class of MUC solutions based on polyinstantiation is described, and several intermediate solutions between rigid classification and polyinstantiation are enumerated.< ></description><subject>Data security</subject><isbn>0818620064</isbn><isbn>9780818620065</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>1989</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KAzEYRQMiVGvXxV1eYMYvv5N0Vwa1QsVFuy9JJqkp6cwwSRd9e4t6NwfO4sBFaEmgJgT0S7tbtzXRSteKgOB36BEUUZICSD5Di5xPcJsQCrR4QOzzkkqsRjOVK3ZDH1J0ZYXLt8fjNNjkz9j0HY4l4zykS4lDn5_QfTAp-8U_52j_9rpvN9X26_2jXW-ro2x4FZgm0jIbXOOlDKHTHKSwjtkmsE5IzUVQVjRGAqeGcK5V526CUk1ZcJTN0fNfNnrvD-MUz2a6Hn5PsR-DlkFy</recordid><startdate>1989</startdate><enddate>1989</enddate><creator>Keefe, T.F.</creator><creator>Thomsen, D.J.</creator><creator>Tsai, W.T.</creator><creator>Hansch, M.R.</creator><general>IEEE Comput. Soc. Press</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>1989</creationdate><title>Multi-party conflict: the problem and its solutions</title><author>Keefe, T.F. ; Thomsen, D.J. ; Tsai, W.T. ; Hansch, M.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-g674-f3916b3bfc7e66ffd94065bc3b7f3d56945f8b57a6042a14498dc8b522923fc23</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>1989</creationdate><topic>Data security</topic><toplevel>online_resources</toplevel><creatorcontrib>Keefe, T.F.</creatorcontrib><creatorcontrib>Thomsen, D.J.</creatorcontrib><creatorcontrib>Tsai, W.T.</creatorcontrib><creatorcontrib>Hansch, M.R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Keefe, T.F.</au><au>Thomsen, D.J.</au><au>Tsai, W.T.</au><au>Hansch, M.R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Multi-party conflict: the problem and its solutions</atitle><btitle>[1989 Proceedings] Fifth Annual Computer Security Applications Conference</btitle><stitle>CSAC</stitle><date>1989</date><risdate>1989</risdate><spage>222</spage><epage>231</epage><pages>222-231</pages><isbn>0818620064</isbn><isbn>9780818620065</isbn><abstract>Currently there is a great deal of interest concerning polyinstantiation in database management systems (DBMSs). However, polyinstantiation is a specific solution to a problem faced by all secure systems, and the problem itself is not well characterized. The problem stems from the interference between subjects of different security compartments. The authors focus on this problem, which they call multiparty update conflict (MUC). They discuss and evaluate some solutions to the MUC problem, such as polyinstantiation and rigid classification. A framework for a class of MUC solutions based on polyinstantiation is described, and several intermediate solutions between rigid classification and polyinstantiation are enumerated.< ></abstract><pub>IEEE Comput. Soc. Press</pub><doi>10.1109/CSAC.1989.81054</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0818620064 |
ispartof | [1989 Proceedings] Fifth Annual Computer Security Applications Conference, 1989, p.222-231 |
issn | |
language | eng |
recordid | cdi_ieee_primary_81054 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Data security |
title | Multi-party conflict: the problem and its solutions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T04%3A30%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Multi-party%20conflict:%20the%20problem%20and%20its%20solutions&rft.btitle=%5B1989%20Proceedings%5D%20Fifth%20Annual%20Computer%20Security%20Applications%20Conference&rft.au=Keefe,%20T.F.&rft.date=1989&rft.spage=222&rft.epage=231&rft.pages=222-231&rft.isbn=0818620064&rft.isbn_list=9780818620065&rft_id=info:doi/10.1109/CSAC.1989.81054&rft_dat=%3Cieee_6IE%3E81054%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=81054&rfr_iscdi=true |