References
- Turban, McLean and Wetherbe, Information Technology for Management, 2nd ed., John Wiley, 1999
- Bell and LaPadula, 'Secure Computer Systems: Mathematical Foundations and Model,' Technical Report, MITRE Corporation, 1974
- B. W. Lampson, 'A Note on the Confinement Problem,' Communications of the ACM, 1973 https://doi.org/10.1145/362375.362389
- J. Goguen and J. Meseguer, 'Security Policy and Security Models,' Proceedings of IEEE Symposium on Security and Privacy, 1982
- J. McDermott and S. Jajodia, 'Orange Locking: Channel-Free Database Concurrency Control Via Locking,' Database Security, VI: State and Prospects, Elsevier Science Publishers, 1993
- P. Ammann and S. Jajodia, 'A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases', Proceedings IFIP WG11.3 Working Group on Database Security, 1991
- P. Ammann, F. Jaeckle, and S. Jajodia, 'A Two Snapshot Algorithm For Concurrency Control In Multi-Level Secure Databases,' Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, 1992 https://doi.org/10.1109/RISP.1992.213260
- R. Mukkamala and S. H. Son, 'A Secure Concurrency Control Protocol for Real-Time Databases,' Proceedings of Annual IFIP WG 11.3 Conference of Database Security, 1995
- 박찬정, 한희준, 박석, '실시간 보안 데이타베이스 시스템에서 병행수행 제어를 위한 얼림 기법', 정보과학회 논문지, 2002
- Y. L. Sohn and S. C. Moon, 'Confidential Concurrency Control for Secure Transaction Management in Database Systems: C3,' Ph D. thesis, Korea Advanced Institute of Science and Technology, 1999
- T. F. keefe and W. T. Tsai, 'Multiversion Concurrency Control for Multilevel Secure Database Systems,' Proceedings of IEEE Symposium on Research in Security and Privacy, 1990 https://doi.org/10.1109/RISP.1990.63865
- P. A. Bernstein, V. Hadzilacos and N. Goodman, Concurrency Control and Recovery in Database Systems, Addison-Wesley, 1987
- P. A. Bernstein and N. Goodman, 'Multiversion Concurrency Control - Theory and Algorithms,' ACM Transactions on Database Systems, 1983 https://doi.org/10.1145/319996.319998
- Q. Ahmed and S. Vrbsky, 'Maintaining Security in Firm Real-Time Database Systems,' Proceedings Computer Security Applications Conference, 1998 https://doi.org/10.1109/CSAC.1998.738584
- B. Kao, K. Y. Lam, B. Adelberg, R. Cheng, and T. Lee, 'Updates and View Maintenance in Soft Real-Time Database Systems,' Proceedings ACM International Conference on Information and Knowledge Management, 1999 https://doi.org/10.1145/319950.320020
- S. H. Son, 'Database Security Issues for Real-Time Electronic Commerce Systems,' IEEE Workshop on Dependable and Real-Time E-Commerce Systems, 1998
- S. Pal, 'A Locking Protocol for MLS Databases Providing Support For Long Transactions,' Database Security IX: Status and Prospects, Chapman&Hall, 1995
- T. Priebe and G. Pernul, 'Towards OLAP Security Design - Survey and Research Issues,' Proceedings of the ACM third international workshop on Data warehousing and OLAP, 2000 https://doi.org/10.1145/355068.355313
- K. Lam, T. Kuo and L. Shu, 'On Using Similarity to Process Transactions in Stock Trading Systems,' Proceedings of the IEEE Workshop on Dependable and Real-Time E-Commerce Systems, 1998
- K. W. Lam, S. H. Son, V. C. S. Lee and S. L. Hung, 'Using Separate Algorithms to Process Read-Only Transactions in Real-Time Systems,' IEEE Real-Time Systems Symposium, 1998 https://doi.org/10.1109/REAL.1998.739730
- B. George and J. Haritsa, 'Secure Concurrency Control in Finn Real-Time Database Systems,' International Journal on Distributed and Parallel Databases, 2000 https://doi.org/10.1023/A:1008783216944
- R. Agrawal, M. J. Carey and M. Livny, 'Concurrency Control Performance Modeling: Alternatives and Implications,' ACM Transactions on Database Systems, 1987 https://doi.org/10.1145/32204.32220
- Herb Schwetman, 'CSIM Users' Guide for use with CSIM Revision 16,' Microelectronics and Computer Technology Corporation, 1992