Security Issues in Distributed Transaction Processing Systems

Security Issues in Distributed Transaction Processing Systems

R. A. Haraty
ISBN13: 9781591405535|ISBN10: 159140553X|EISBN13: 9781591407942
DOI: 10.4018/978-1-59140-553-5.ch434
Cite Chapter Cite Chapter

MLA

Haraty, R. A. "Security Issues in Distributed Transaction Processing Systems." Encyclopedia of Information Science and Technology, First Edition, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2005, pp. 2455-2458. https://doi.org/10.4018/978-1-59140-553-5.ch434

APA

Haraty, R. A. (2005). Security Issues in Distributed Transaction Processing Systems. In M. Khosrow-Pour, D.B.A. (Ed.), Encyclopedia of Information Science and Technology, First Edition (pp. 2455-2458). IGI Global. https://doi.org/10.4018/978-1-59140-553-5.ch434

Chicago

Haraty, R. A. "Security Issues in Distributed Transaction Processing Systems." In Encyclopedia of Information Science and Technology, First Edition, edited by Mehdi Khosrow-Pour, D.B.A., 2455-2458. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-553-5.ch434

Export Reference

Mendeley
Favorite

Abstract

Transaction-processing systems (TPS) are becoming increasingly more available as commercial products. However, the approaches to the issues associated with using TPS in multilevel secure environments are still in the research stage. In this article, we address the issues of multilevel security in distributed transaction-processing systems. A distributed transaction-processing system (DTPS) is a collection of a finite number of centralized transaction-processing systems connected by a computer network. Each of these transaction-processing systems is controlled by a software layer and can be accessed both remotely and locally. Properties of a DTPS, such as data replication, may have a substantial effect on the security of the system. The security policies and integrity constraints adopted at each site may result in global security having inconsistent states. We address the issues of achieving a multilevel secure DTPS, and discuss the security constraints and data replication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.