ACM Transactions on Programming Languages and Systems (TOPLAS)
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A study of time warp rollback mechanisms
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A survey of intrusion detection techniques
Computers and Security
A Survey of Distributed Database Checkpointing
Distributed and Parallel Databases
Temporal sequence learning and data reduction for anomaly detection
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
DEMIDS: a misuse detection system for database systems
Integrity and internal control information systems
Intrusion confinement by isolation in information systems
Journal of Computer Security - Special issue on database security
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
A Chinese wall security model for decentralized workflow systems
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A survey of rollback-recovery protocols in message-passing systems
ACM Computing Surveys (CSUR)
A Low-Cost Checkpointing Technique for Distributed Databases
Distributed and Parallel Databases
On a Pattern-Oriented Model for Intrusion Detection
IEEE Transactions on Knowledge and Data Engineering
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
IEEE Transactions on Software Engineering
A Scheme to Specify and Implement Ad-Hoc Recovery in Workflow Systems
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
Failure Handling for Transaction Hierarchies
ICDE '97 Proceedings of the Thirteenth International Conference on Data Engineering
Architectures for Intrusion Tolerant Database Systems
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
COOPIS '96 Proceedings of the First IFCIS International Conference on Cooperative Information Systems
ODAR: an on-the-fly damage assessment and repair system for commercial database applications
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
USTAT: A Real-Time Intrusion Detection System for UNIX
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Information-Theoretic Measures for Anomaly Detection
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Anomaly detection of web-based attacks
Proceedings of the 10th ACM conference on Computer and communications security
Multi-Version Attack Recovery for Workflow Systems
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Self-Healing Workflow Systems under Attacks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
IDAMN: an intrusion detection architecture for mobile networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Even though self-healing techniques for transactional processes have attracted enough attention in recent years, several critical issues regarding the distributed systems have not been addressed. For example, if we do the recovery under sustained attacks, in which condition the recovery can terminate? Is a synchronized clock necessary for distributed recovery? In this paper, we proposed a dead-lock free algorithm for coordinated recovery and answered related questions. We also proved that under specific situations, we have to freeze the recovery scheme to guarantee that the recovery can make progress.