Collecting garbage in multilevel secure object stores

This paper addresses the problem of garbage collection in persistent object stores that are multilevel. The proposed approach is able to preserve referential integrity, while ensuring that security is not violated. we first discuss some general principles that should underlie any approach to garbage collection in secure environments. Then, we present a secure garbage collection algorithm, based on the copying approach.<<ETX>>

[1]  Richard D. Graubart,et al.  A Comparison of Three Secure DBMS Architectures , 1989, DBSec.

[2]  David Maier,et al.  The GemStone Data Management System , 1989, Object-Oriented Concepts, Databases, and Applications.

[3]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[4]  Luigi V. Mancini,et al.  Copying garbage collection for distributed object stores , 1991, [1991] Proceedings Tenth Symposium on Reliable Distributed Systems.

[5]  Sushil Jajodia,et al.  Integrating an object-oriented data model with multilevel security , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[6]  M. B. Thuraisingham Mandatory security in object-oriented database systems , 1989, OOPSLA 1989.

[7]  Chris J. Cheney A nonrecursive list compacting algorithm , 1970, Commun. ACM.

[8]  Santosh K. Shrivastava,et al.  Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems , 1991, Comput. J..

[9]  Elliot K. Kolodner,et al.  Garbage Collection: Managing a Stable Heap , 2022 .

[10]  Sushil Jajodia,et al.  Referential Integrity in Multilevel Secure Database Management Systems , 1992, SEC.

[11]  Benjamin G. Zorn,et al.  Comparative performance evaluation of garbage collection algorithms , 1989 .

[12]  Elisa Bertino,et al.  Modeling Multilevel Entities Using Single Level Objects , 1993, DOOD.

[13]  Bhavani M. Thuraisingham,et al.  Mandatory security in object-oriented database systems , 1989, OOPSLA '89.

[14]  Elisa Bertino,et al.  A model of authorization for next-generation database systems , 1991, TODS.

[15]  Ken Kennedy,et al.  Compiling Fortran D for MIMD distributed-memory machines , 1992, CACM.

[16]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[17]  J. Eliot B. Moss,et al.  Working with Persistent Objects: To Swizzle or Not to Swizzle , 1992, IEEE Trans. Software Eng..

[18]  Elisa Bertino,et al.  Data hiding and security in object-oriented databases , 1992, [1992] Eighth International Conference on Data Engineering.

[19]  Jonathan K. Millen,et al.  Security for object-oriented database systems , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[20]  Elisa Bertino,et al.  Object-Oriented Database Systems: Concepts and Architectures , 1993 .

[21]  Sushil Jajodia,et al.  Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[22]  Ehud Gudes,et al.  A Model of Methods Access Authorization in Object-oriented Databases , 1993, VLDB.

[23]  O. Deux,et al.  The Story of O2 , 1990, IEEE Trans. Knowl. Data Eng..