Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Data dependency based logging for defensive information warfare
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 1
Transaction fusion in the wake of information warfare
Proceedings of the 2001 ACM symposium on Applied computing
Extended data dependency approach: a robust way of rebuilding database
Proceedings of the 2002 ACM symposium on Applied computing
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Architectures for Intrusion Tolerant Database Systems
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
ODAR: an on-the-fly damage assessment and repair system for commercial database applications
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Design, Implementation, and Evaluation of a Repairable Database Management System
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
The design and implementation of a self-healing database system
Journal of Intelligent Information Systems - Special issue: Database and applications security
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Hi-index | 0.00 |
Recovering from malicious attacks in survival database systems is vital in mission-critical information systems. Traditional rollback and re-execute techniques are too time-consuming and can not be applied in survival environments. In this paper, two efficient approaches - transaction dependency based and data dependency based are proposed. Comparing to transaction dependency based approach, data dependency recovery approaches need not undo innocent operations in malicious and affected transactions even some benign blind writeson bad data item speed up recovery process.