Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Covert Channel

Encyclopedia of Information Science and Technology, Second Edition
This is a channel that is not meant to route information, but nevertheless does
Published in Chapter:
Security Issues in Distributed Transaction Processing Systems
R. A. Haraty (Lebanese American University, Lebanon)
DOI: 10.4018/978-1-60566-026-4.ch538
Abstract
Transaction-processing systems (TPS) are becoming increasingly more available as commercial products. However, the approaches to the issues associated with using TPS in multilevel secure environments are still in the research stage. In this article, we address the issues of multilevel security in distributed transaction-processing systems. A distributed transaction-processing system (DTPS) is a collection of a finite number of centralized transaction-processing systems connected by a computer network. Each of these transaction- processing systems is controlled by a software layer and can be accessed both remotely and locally. Properties of a DTPS, such as data replication, may have a substantial effect on the security of the system. The security policies and integrity constraints adopted at each site may result in global security having inconsistent states. We address the issues of achieving a multilevel secure DTPS, and discuss the security constraints and data replication. In this work, we address the issues of achieving a multilevel secure DTPSs system and discuss the security constraints and the replication of data items. The next section provides some background. Then, next, an overview of a distributed transaction-processing system is presented. In the fourth section, security-related issues are discussed. In the fifth section, a multilevel secure distributed transactionprocessing system is presented. Then, in the next section, future trends are presented. The final section concludes the article.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Critical Analysis of Digital Steganography
A communication channel that transfers information in a way that violates security policy.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR