Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
ACM Transactions on Database Systems (TODS)
A Survey of Distributed Database Checkpointing
Distributed and Parallel Databases
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
A Scheme to Specify and Implement Ad-Hoc Recovery in Workflow Systems
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Using Checksums to Detect Data Corruption
EDBT '00 Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology
Failure Handling for Transaction Hierarchies
ICDE '97 Proceedings of the Thirteenth International Conference on Data Engineering
Reconstructing the Database after Electronic Attacks
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Architectures for Intrusion Tolerant Database Systems
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
COOPIS '96 Proceedings of the First IFCIS International Conference on Cooperative Information Systems
Towards a model of storage jamming
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Reorganization of the database log for information warfare data recovery
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Design, Implementation, and Evaluation of a Repairable Database Management System
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Recovery from "bad" user transactions
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Towards Database Firewall: Mining the Damage Spreading Patterns
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
Finding and analyzing database user sessions
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
A Robust Damage Assessment Model for Corrupted Database Systems
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Dynamic damage recovery for web databases
Journal of Computer Science and Technology
Hi-index | 0.00 |
As Web services gain popularity in today's E-Business world, surviving DBMSs from an attack is becoming crucial because of the increasingly critical role that database servers are playing. Although a number of research projects have been done to tackle the emerging data corruption threats, existing mechanisms are still limited in meeting four highly desired requirements: near-zero-run-time overhead, zero-system-down time, zero-blocking-timefor read-only transactions, minimal-delay-timefor read-write transactions. In this paper, we propose TRACE, a zero-system-down-time database damage tracking, quarantine, and recovery solution with negligible run time overhead. TRACE consists of a family of new database damage tracking, quarantine, and cleansing techniques. We built TRACE into the kernel of PostgreSQL. Our experimental results demonstrated that TRACE is the first solution that can simultaneously satisfy the first two requirements aforementioned and the first solution that can satisfy all the four requirements.