共查询到20条相似文献,搜索用时 15 毫秒
1.
《IT Professional》2002,4(4):47-52
As enterprises conduct more and more of their business activities online, the need for security becomes more crucial. Organizations must implement protocols to address a variety of security-related tasks. An e-business would want to allow an easy access to its site but still provide data security and authentication for e-commerce transactions. For this level of need, one security protocol SSL, the secure sockets layer, has been widely implemented and is now the de facto standard for providing secure e-commerce. 相似文献
2.
3.
4.
Correctness criteria for multilevel secure transactions 总被引:2,自引:0,他引:2
Smith K.P. Blaustein B.T. Jajodia S. Notargiacomo L. 《Knowledge and Data Engineering, IEEE Transactions on》1996,8(1):32-45
The benefits of distributed systems and shared database resources are widely recognized, but they often cannot be exploited by users who must protect their data by using label-based access controls. In particular, users of label-based data need to read and write data at different security levels within a single database transaction, which is not currently possible without violating multilevel security constraints. The paper presents a formal model of multilevel transactions which provide this capability. We define four ACIS (atomicity, consistency, isolation, and security) correctness properties of multilevel transactions. While atomicity, consistency and isolation are mutually achievable in standard single-site and distributed transactions, we show that the security requirements of multilevel transactions conflict with some of these goals. This forces trade-offs to be made among the ACIS correctness properties, and we define appropriate partial correctness properties. Due to such trade-offs, an important problem is to design multilevel transaction execution protocols which achieve the greatest possible degree of correctness. These protocols must provide a variety of approaches to making trade-offs according to the differing priorities of various users. We present three transaction execution protocols which achieve a high degree of correctness. These protocols exemplify the correctness trade-offs proven in the paper, and offer realistic implementation options 相似文献
5.
《Card Technology Today》2000,12(8):11
Four and half thousand Visa-affiliated banks across Europe have agreed a programme to step up security for cardholders making transactions across the Internet. 相似文献
6.
为满足移动自组网(MANETS)多级事务处理的安全性和并发性要求,将多版本两段锁协议运用到MANETS多级事务中。该协议有效地解决了由于竞争产生的错误的事务调度以及安全问题。模拟仿真结果表明,多版本两段锁协议在延迟截至时间率和重启动率方面比单一的多版本协议或者单一的两段锁协议都要低。 相似文献
7.
《网络安全技术与应用》2006,(10):12
近日,全球领先的应用优化和全局安全访问解决方案的提供商ArrayNetworks宣布,在全球500强企业——中国石油天然气股份有限公司(以下简称中石油)的SSLVPN项目招标中一举中标。中石油将采购九台ArraySSLVPN——SPX3000和两台智能负载均衡设备。ArrayNetworks将通过由这九台高端SSLVPN网关和两台智能负载均衡设备构成的分布式远程安全访问(DRSA)的解决方案,为中石油打造一个高效、安全、扩展性极佳的企业应用延展系统。确保企业员工通过统一域名,可以在任何时间,使用任何访问方式,经由设立的九大VPN接入点均可就近接入其内部核心… 相似文献
8.
Simon Scarle Sylvester Arnab Ian Dunwell Panagiotis Petridis Aristidis Protopsaltis Sara de Freitas 《Electronic Commerce Research》2012,12(3):379-407
E-commerce is a fundamental method of doing business, such that for a firm to say it is trading at all in the modern market-place it must have some element of on-line presence. Coupled with this is the explosion of the “population” of Massively Multiplayer On-line Role Playing Games and other shared virtual environments. Many suggest this will lead to a further dimension of commerce: virtual commerce. We discuss here the issues, current roadblocks and present state of an e-commerce transaction carried out completely within a virtual environment; a virtual transaction. Although technically such transactions are in a sense trivial, they raise many other issues in complex ways thus making V-transactions a highly interesting cross-disciplinary issue. We also discuss the social, ethical and regulatory implications for the virtual communities in these environments of such v-transactions, how their implementation affects the nature and management of a virtual environment, and how they represent a fundamental merging of the real and virtual worlds for the purpose of commerce. We highlight the minimal set of features a v-transaction capable virtual environment requires and suggest a model of how in the medium term they could be carried out via a methodology we call click-through, and that the developers of such environments will need to take on the multi-modal behavior of their users, as well as elements of the economic and political sciences in order to fully realize the commercial potential of the v-transaction. 相似文献
9.
Atomic delegation, an object-oriented linguistic mechanism that allows the creation of dynamically defined classes of atomic actions is presented. When a type is modified, atomic delegation updates functionalities of the the types that delegate to the modified type. This mechanism permits dynamic binding and code reuse in atomic actions. The Sina language is used to illustrate the utility of atomic delegation in the modeling of a real-world problem, involving an office with a number of departments, using object-oriented techniques. Implementation issues are discussed 相似文献
10.
《Information and Software Technology》2002,44(1):41-51
In this paper, we present methods of translating transactions from object-oriented database (OODB) to relational database (RDB). The process involves schema mapping in data definition language and transaction translation in data manipulation language. They include scheme definition, data query and transaction operation of insert, update, and deletion. We also discuss the object-oriented features in OODB operations that are not supported by RDB, such as class hierarchy, class composition hierarchy, and set attribute, and provide a general solution to realize those mechanisms by traditional relation operations. The result of the transaction translation can be applied into adding object-oriented interface into relational database management system and to the interoperability between OODB and RDB. 相似文献
11.
12.
Carsten Binnig Stefan Hildenbrand Franz Färber Donald Kossmann Juchang Lee Norman May 《The VLDB Journal The International Journal on Very Large Data Bases》2014,23(6):987-1011
Modern database systems employ Snapshot Isolation to implement concurrency control and isolationbecause it promises superior query performance compared to lock-based alternatives. Furthermore, Snapshot Isolation never blocks readers, which is an important property for modern information systems, which have mixed workloads of heavy OLAP queries and short update transactions. This paper revisits the problem of implementing Snapshot Isolation in a distributed database system and makes three important contributions. First, a complete definition of Distributed Snapshot Isolation is given, thereby extending existing definitions from the literature. Based on this definition, a set of criteria is proposed to efficiently implement Snapshot Isolation in a distributed system. Second, the design space of alternative methods to implement Distributed Snapshot Isolation is presented based on this set of criteria. Third, a new approach to implement Distributed Snapshot Isolation is devised; we refer to this approach as Incremental. The results of comprehensive performance experiments with the TPC-C benchmark show that the Incremental approach significantly outperforms any other known method from the literature. Furthermore, the Incremental approach requires no a priori knowledge of which nodes of a distributed system are involved in executing a transaction. Also, the Incremental approach can execute transactions that involve data from a single node only with the same efficiency as a centralized database system. This way, the Incremental approach takes advantage of sharding or other ways to improve data locality. The cost for synchronizing transactions in a distributed system is only paid by transactions that actually involve data from several nodes. All these properties make the Incremental approach more practical than related methods proposed in the literature. 相似文献
13.
14.
15.
Grigorios Loukides Aris Gkoulalas-Divanis Bradley Malin 《Knowledge and Information Systems》2011,28(2):251-282
Publishing transactional data about individuals in an anonymous form is increasingly required by organizations. Recent approaches
ensure that potentially identifying information cannot be used to link published transactions to individuals’ identities.
However, these approaches are inadequate to anonymize data that is both protected and practically useful in applications because
they incorporate coarse privacy requirements, do not integrate utility requirements, and tend to explore a small portion of
the solution space. In this paper, we propose the first approach for anonymizing transactional data under application-specific
privacy and utility requirements. We model such requirements as constraints, investigate how these constraints can be specified,
and propose COnstraint-based Anonymization of Transactions, an algorithm that anonymizes transactions using a flexible anonymization
scheme to meet the specified constraints. Experiments with benchmark datasets verify that COAT significantly outperforms the
current state-of-the-art algorithm in terms of data utility, while being comparable in terms of efficiency. Our approach is
also shown to be effective in preserving both privacy and utility in a real-world scenario that requires disseminating patients’
information. 相似文献
16.
Ray Stanton 《Computer Fraud & Security》2005,2005(9):17-19
17.
The Tentative Hold Protocol (THP) helps automate the coordination of multi-business interactions, providing cost savings and enabling new business models in the process. Automating the exchange of critical information using this protocol prior to a transaction decreases the effect of outdated data, reduces the potential for cancellations, and improves the odds of successfully completing transactions. This article describes THP, explains how to use it synergistically with other technologies, describes some scenarios from different industries in which it could be applied, and provides greater technical detail about its components and limitations. 相似文献
18.
Electronic commerce currently relies on traditional third party enforcement mechanisms that don't necessarily translate well to cyberspace. Chunking algorithms offer one possibility for unenforced transactions between self motivated agents. This method enables transactions in settings where the parties cannot identify each other, or where litigation is not viable. It also allows computational agents to be more autonomous by not requiring them to be strictly tied to the real world parties they represent. In cases where this type of unenforced exchange is possible, it is preferable to the strictly enforced mode of exchange because it saves enforcement costs (for example, litigation costs or operations costs of trusted third party intermediaries) and it is insensitive to enforcement uncertainties. The method is based on managing the exchange between two agents-a supplier and a demander-so that the gains from completing the exchange (cooperating according to a contract) at any point are larger for both agents than the gains from terminating it (defecting the exchange prematurely by vanishing) 相似文献
19.
刘欣桃 《网络安全技术与应用》2003,(11):30-33
本文讨论了在IP网上应用非常广泛的SSL(TLS)协议以及其安全缺陷,并针对存在的缺陷介绍了相应的解决办法,为用户使用SSL协议提供了很好的建议和参考。 相似文献