Int. J. of High Performance Computing and Networking   »   2007 Vol.5, No.1/2

 

 

Title: Concurrency control based on role concept

 

Author: Tomoya Enokido

 

Address: Faculty of Business Administration, Rissho University, Japan

 

Abstract: A Role-Based Access Control (RBAC) model is used to make a system secure. In addition to keeping systems secure, objects have to be consistent in the presence of multiple transactions. Traditional locking protocols and timestamp ordering schedulers are based on 'first-comer-winner' and 'timestamp order' principles to make multiple conflicting transactions serialisable, respectively. In this paper, we discuss concurrency control algorithms based on the significance of roles. We discuss a Role Ordering (RO) scheduler so that multiple conflicting transactions are serialisable in a significant dominant relation of roles. We evaluate the RO scheduler as compared with the Two-Phase Locking (2PL) protocol.

 

Keywords: role ordering schedulers; concurrency control; scheduling; conflicting transactions; locking protocols; serialisability; access control; timestamp ordering schedulers.

 

DOI: 10.1504/IJHPCN.2007.015766

 

Int. J. of High Performance Computing and Networking, 2007 Vol.5, No.1/2, pp.75 - 83

 

Available online: 14 Nov 2007

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article