-
- Enokido Tomoya
- Faculty of Business Administration, Rissho University
抄録
A role-based access control model is used to make a system secure. A role concept shows a job function in an enterprise. Traditional locking protocols and timestamp ordering schedulers are based on principles “first-comer-winner” and “timestamp order” to make multiple conflicting transactions serializable, respectively. In this paper, we discuss a concurrency control based on the significancy of roles assigned to transactions. We define a significantly dominant relation on roles. We discuss a role ordering (RO) scheduler based on the role concept. We evaluate the RO scheduler compared with the two-phase locking (2PL) protocol.
収録刊行物
-
- IPSJ Digital Courier
-
IPSJ Digital Courier 1 626-633, 2005
一般社団法人 情報処理学会
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1390282680200731776
-
- NII論文ID
- 130000022359
-
- ISSN
- 13497456
-
- 本文言語コード
- en
-
- データソース種別
-
- JaLC
- Crossref
- CiNii Articles
-
- 抄録ライセンスフラグ
- 使用不可