Communications of the ACM
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Transaction fusion in the wake of information warfare
Proceedings of the 2001 ACM symposium on Applied computing
Intrusion Detection in Real-Time Database Systems via Time Signatures
RTAS '00 Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium (RTAS 2000)
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
A data mining approach for database intrusion detection
Proceedings of the 2004 ACM symposium on Applied computing
Evaluating damage from cyber attacks: a model and analysis
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
The implementation and evaluation of a recovery system for workflows
Journal of Network and Computer Applications
Hi-index | 0.00 |
This paper presents methods for assessing damage in a database system after an attack is identified and a malicious transaction is detected By using pre-developed data structures our protocols identify all affected transactions and also damaged data items without requiring any log access These data structures are built using bit-vectors and are manipulated using logical AND and OR operations to achieve faster damage assessment.