Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Survivable mobile wireless networks: issues, challenges, and research directions
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Architectural style requirements for self-healing systems
WOSS '02 Proceedings of the first workshop on Self-healing systems
Survivability: Protecting Your Critical Systems
IEEE Internet Computing
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Reorganization of the database log for information warfare data recovery
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Self-healing systems - survey and synthesis
Decision Support Systems
Critical service recovery model for system survivability
MS '08 Proceedings of the 19th IASTED International Conference on Modelling and Simulation
Information-Knowledge-Systems Management
Hi-index | 0.00 |
This paper presents a framework to enhance a system's survivability to thwart malicious attacks and to continuously provide critical services to users. We focus on two key survivability elements: strategy and tactic. The latter further includes a set of activities and operations. We show how survivability activities are developed in light of tactics to implement the chosen survivability strategies in face of malicious attacks. An example of military command and control system is presented, where a set of survivability activities are specified to carry out two strategies: dynamic system reconfiguration and transparent system repairs. An architectural model is proposed to facilitate system design in building survivable systems.