Please use this identifier to cite or link to this item:
http://dspace.cityu.edu.hk/handle/2031/546
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ho, Karmen Ka Man | |
dc.date.accessioned | 2006-01-20T06:35:03Z | |
dc.date.accessioned | 2017-09-19T08:51:24Z | |
dc.date.accessioned | 2019-02-12T06:53:37Z | - |
dc.date.available | 2006-01-20T06:35:03Z | |
dc.date.available | 2017-09-19T08:51:24Z | |
dc.date.available | 2019-02-12T06:53:37Z | - |
dc.date.issued | 2003 | |
dc.identifier.other | 2003cshkm839 | |
dc.identifier.uri | http://144.214.8.231/handle/2031/546 | - |
dc.description.abstract | Time is a critical factor to be considered in a real time database system. The correctness of the system depends not only on the logical results but also on the time within which the results are produced. Transactions must be scheduled in such a way that they can be completed before their corresponding deadlines expire. However, in recent years, security in the database systems has increased importance. Therefore, in this paper, the performance of the real-time database system incorporating security constraint will be examined. So that security requirement can be achieved without significantly degrading the performances of the real time database systems. In particular, I will focus to study the performances of several concurrency control algorithms in the “firm-deadline database systems”, where transactions miss the deadline are immediately discarded from the system. Besides, two new algorithms will be presented in the project: The Secure-ANDOPT- SACRIFICE is based on the existing algorithm by changing the validation criteria of it. And the Security-Priority-SACRIFICE uses the transactions security level to solve the security constraint in the secure real-time database system. A detailed simulation model is used to compare the performances of the algorithms under a wide range of parameter setting for a secure real-time database system. The results of the studies show that incorporating security in the database system does not necessarily cause an increased sacrifice in the real time performance. However, choosing which or what algorithm to implement in a secure real time database system depends on the user’s decisions whether timeliness or security is more important to be maintained. | |
dc.format.extent | 164 bytes | |
dc.format.mimetype | text/html | |
dc.rights | This work is protected by copyright. Reproduction or distribution of the work in any format is prohibited without written permission of the copyright owner. | |
dc.rights.uri | Access is restricted to CityU users. | |
dc.title | Secure transaction processing in real-time database | en |
dc.contributor.department | Department of Computer Science | en |
dc.description.supervisor | Dr. Lee, Victor C S. First Reader: Dr. Fong, Joseph S P. Second Reader: Prof. Chan, Isaac Y K | |
Appears in Collections: | Computer Science - Undergraduate Final Year Projects |
Files in This Item:
File | Size | Format | |
---|---|---|---|
fulltext.html | 164 B | HTML | View/Open |
Items in Digital CityU Collections are protected by copyright, with all rights reserved, unless otherwise indicated.