Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Oliver Costich is active.

Publication


Featured researches published by Oliver Costich.


ieee symposium on security and privacy | 1992

A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture

Oliver Costich; John P. McDermott

A definition of multilevel transaction for multilevel secure databases is proposed, and a notion of correctness that is consistent with the traditional idea of correctness of replicated systems is defined. To demonstrate the applicability of these ideas, an algorithm for correct transaction processing within this framework is presented for replicated architecture multilevel databases.<<ETX>>


ieee computer security foundations symposium | 1992

A classical automata approach to noninterference type problems

Ira S. Moskowitz; Oliver Costich

Using classical automata theory the authors show how noninterference can be viewed as a relatively simple phenomenon. They also give direction for future work concerning probabilistic security problems using classical automata theory.<<ETX>>


ieee computer security foundations symposium | 1991

Analysis of a storage channel in the two phase commit protocol

Oliver Costich; Ira S. Moskowitz

The authors discuss how a noisy storage channel arises in the two phase commit protocol. The analysis is done through Shannons information theory. They discuss how large the channel is and offer suggestions on how to diminish the channel capacity.<<ETX>>


conference on object-oriented programming systems, languages, and applications | 1994

Using Object Modeling Techniques To Design MLS Data Models

Myong H. Kang; Judith N. Froscher; Oliver Costich

The expressiveness of the data model has a significant impact on the functionality of the resulting database system. The more general the data model, the less need be lost when the conceptual model is mapped onto a particular data model.


Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects | 1991

Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture

Oliver Costich


Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects | 1993

A practical transaction model and untrusted transaction manager for a multilevel-secure database system

Myong H. Kang; Oliver Costich; Judith N. Froscher


Archive | 1994

Achieving Database Security Through Data Replication: The Sintra Prototype

Myong H. Kang; Judith N. Froscher; John P. McDermott; Oliver Costich; Rodney Peyton


Proceedings of the IFIP WG11.3 Working Conference on Database Security VII | 1993

Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture

Oliver Costich; Myong H. Kang


ieee computer security foundations symposium | 1994

Confidentiality in a replicated architecture trusted database system: a formal model

Oliver Costich; John McLean; John P. McDermott


Proceedings of the IFIP WG11.3 Working Conference on Database Security VII | 1994

The SINTRA Data Model: Structure and Operations

Oliver Costich; Myong H. Kang; Judith N. Froscher

Collaboration


Dive into the Oliver Costich's collaboration.

Top Co-Authors

Avatar

Myong H. Kang

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Judith N. Froscher

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

John P. McDermott

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

Ira S. Moskowitz

United States Naval Research Laboratory

View shared research outputs
Top Co-Authors

Avatar

John McLean

United States Naval Research Laboratory

View shared research outputs
Researchain Logo
Decentralizing Knowledge