Oliver Costich
George Mason University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Oliver Costich.
ieee symposium on security and privacy | 1992
Oliver Costich; John P. McDermott
A definition of multilevel transaction for multilevel secure databases is proposed, and a notion of correctness that is consistent with the traditional idea of correctness of replicated systems is defined. To demonstrate the applicability of these ideas, an algorithm for correct transaction processing within this framework is presented for replicated architecture multilevel databases.<<ETX>>
ieee computer security foundations symposium | 1992
Ira S. Moskowitz; Oliver Costich
Using classical automata theory the authors show how noninterference can be viewed as a relatively simple phenomenon. They also give direction for future work concerning probabilistic security problems using classical automata theory.<<ETX>>
ieee computer security foundations symposium | 1991
Oliver Costich; Ira S. Moskowitz
The authors discuss how a noisy storage channel arises in the two phase commit protocol. The analysis is done through Shannons information theory. They discuss how large the channel is and offer suggestions on how to diminish the channel capacity.<<ETX>>
conference on object-oriented programming systems, languages, and applications | 1994
Myong H. Kang; Judith N. Froscher; Oliver Costich
The expressiveness of the data model has a significant impact on the functionality of the resulting database system. The more general the data model, the less need be lost when the conceptual model is mapped onto a particular data model.
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects | 1991
Oliver Costich
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects | 1993
Myong H. Kang; Oliver Costich; Judith N. Froscher
Archive | 1994
Myong H. Kang; Judith N. Froscher; John P. McDermott; Oliver Costich; Rodney Peyton
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII | 1993
Oliver Costich; Myong H. Kang
ieee computer security foundations symposium | 1994
Oliver Costich; John McLean; John P. McDermott
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII | 1994
Oliver Costich; Myong H. Kang; Judith N. Froscher