{"id":"https://openalex.org/W1636923701","doi":"https://doi.org/10.3233/jcs-1994/1995-32-302","title":"Concurrency Control in a Secure Multilevel Database via a Two-Snapshot Algorithm","display_name":"Concurrency Control in a Secure Multilevel Database via a Two-Snapshot Algorithm","publication_year":1995,"publication_date":"1995-04-01","ids":{"openalex":"https://openalex.org/W1636923701","doi":"https://doi.org/10.3233/jcs-1994/1995-32-302","mag":"1636923701"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-1994/1995-32-302","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-1994/1995-32-302","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037613705","display_name":"Paul Ammann","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Paul Ammann","raw_affiliation_strings":["Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA","Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA#TAB#","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014239440","display_name":"Frank Jaeckle","orcid":null},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Frank Jaeckle","raw_affiliation_strings":["Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA","Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA#TAB#","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010727123","display_name":"Sushil Jajodia","orcid":"https://orcid.org/0000-0003-3210-558X"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sushil Jajodia","raw_affiliation_strings":["Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA","Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA","institution_ids":["https://openalex.org/I162714631"]},{"raw_affiliation_string":"Center For Secure Information Systems, Department of Information and Software Systems Engineering, George Mason University, Fairfax, VA 22030, USA#TAB#","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037613705"],"corresponding_institution_ids":["https://openalex.org/I162714631"],"apc_list":null,"apc_paid":null,"fwci":0.9717,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.78226178,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":"2-3","first_page":"87","last_page":"113"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8623088598251343},{"id":"https://openalex.org/keywords/serializability","display_name":"Serializability","score":0.7637978792190552},{"id":"https://openalex.org/keywords/concurrency-control","display_name":"Concurrency control","score":0.7088426351547241},{"id":"https://openalex.org/keywords/snapshot","display_name":"Snapshot (computer storage)","score":0.670471727848053},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.6668095588684082},{"id":"https://openalex.org/keywords/multiversion-concurrency-control","display_name":"Multiversion concurrency control","score":0.4827239215373993},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4716814160346985},{"id":"https://openalex.org/keywords/optimistic-concurrency-control","display_name":"Optimistic concurrency control","score":0.4517785608768463},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41692274808883667},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.37559598684310913},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.365740031003952},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.3103509545326233},{"id":"https://openalex.org/keywords/distributed-concurrency-control","display_name":"Distributed concurrency control","score":0.261385440826416},{"id":"https://openalex.org/keywords/distributed-transaction","display_name":"Distributed transaction","score":0.1723928451538086},{"id":"https://openalex.org/keywords/transaction-processing","display_name":"Transaction processing","score":0.16934308409690857}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8623088598251343},{"id":"https://openalex.org/C191558696","wikidata":"https://www.wikidata.org/wiki/Q137712","display_name":"Serializability","level":5,"score":0.7637978792190552},{"id":"https://openalex.org/C84511453","wikidata":"https://www.wikidata.org/wiki/Q2914952","display_name":"Concurrency control","level":3,"score":0.7088426351547241},{"id":"https://openalex.org/C55282118","wikidata":"https://www.wikidata.org/wiki/Q252683","display_name":"Snapshot (computer storage)","level":2,"score":0.670471727848053},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.6668095588684082},{"id":"https://openalex.org/C108744092","wikidata":"https://www.wikidata.org/wiki/Q93695","display_name":"Multiversion concurrency control","level":5,"score":0.4827239215373993},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4716814160346985},{"id":"https://openalex.org/C79240183","wikidata":"https://www.wikidata.org/wiki/Q1779327","display_name":"Optimistic concurrency control","level":5,"score":0.4517785608768463},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41692274808883667},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.37559598684310913},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.365740031003952},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.3103509545326233},{"id":"https://openalex.org/C208087996","wikidata":"https://www.wikidata.org/wiki/Q5283142","display_name":"Distributed concurrency control","level":4,"score":0.261385440826416},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.1723928451538086},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.16934308409690857}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-1994/1995-32-302","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-1994/1995-32-302","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.41999998688697815,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1519988981","https://openalex.org/W1545155892","https://openalex.org/W1552464932","https://openalex.org/W1559467224","https://openalex.org/W1584919195","https://openalex.org/W1882297107","https://openalex.org/W1991895580","https://openalex.org/W1992810975","https://openalex.org/W2023304911","https://openalex.org/W2035891203","https://openalex.org/W2097667996","https://openalex.org/W2110938135","https://openalex.org/W2121984445","https://openalex.org/W2130688381","https://openalex.org/W2142011520","https://openalex.org/W2528355824"],"related_works":["https://openalex.org/W1489494763","https://openalex.org/W2083731697","https://openalex.org/W2105700867","https://openalex.org/W2147319745","https://openalex.org/W2132431901","https://openalex.org/W1827815954","https://openalex.org/W194184034","https://openalex.org/W2347732610","https://openalex.org/W2974602222","https://openalex.org/W2391003895"],"abstract_inverted_index":{"We":[0,11,81],"offer":[1],"a":[2,16,33,37,64,88,97,135],"concurrency":[3],"conirol":[4],"algorithm":[5,14,90,126],"for":[6,85,129],"replicated,":[7],"secure,":[8],"multilevel":[9],"databases.":[10],"compare":[12],"the":[13,21,26,47,103],"with":[15,20],"multiversion":[17],"approach":[18,48,104],"and":[19,110,112],"typical":[22],"full-replication":[23,27],"approach.":[24],"In":[25,46,119],"approach,":[28],"each":[29,70],"security":[30,44,56,131],"level":[31,71],"maintains":[32],"container":[34],"that":[35,102,133],"holds":[36],"complete":[38],"copy":[39],"of":[40,67,107],"data":[41,53],"at":[42,54,69],"lower":[43,55],"levels.":[45],"described":[49],"here,":[50],"access":[51],"to":[52,91,94,121],"levels":[57],"is":[58,79,105,127,134],"through":[59],"shared,":[60],"read-only":[61],"snapshots,":[62,86,95],"where":[63],"constant":[65],"number":[66],"snapshots":[68],"\u2013":[72,78],"two,":[73],"as":[74],"it":[75],"turns":[76],"out":[77],"sufficient.":[80],"derive":[82],"necessary":[83],"properties":[84],"give":[87],"switching":[89],"assign":[92],"read-downs":[93],"specify":[96],"snapshot":[98],"creation":[99],"algorithm,":[100],"demonstrate":[101],"free":[106],"indirect":[108],"channels":[109],"starvation,":[111],"prove":[113],"one-copy":[114],"serializability":[115],"on":[116],"execution":[117],"histories.":[118],"contrast":[120],"some":[122],"comparable":[123],"algorithms,":[124],"our":[125],"correct":[128],"any":[130],"structure":[132],"partial":[136],"order.":[137]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
