List of Figures. List of Tables. Preface. 1. Introduction. 2. Traditional Transaction Processing. 3. Transaction Processing in MLS Databases. 4. Secure Transaction Processing in Real-Time Databases. 5. Secure Workflow Transaction Processing. 6. Secure Buffer Management. 7. Applications to Hierarchical and Replicated Databases. 8. Challenges. References. Index.
"synopsis" may belong to another edition of this title.