Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Fundamentals of database systems (2nd ed.)
Fundamentals of database systems (2nd ed.)
Proceedings of the ninth annual IFIP TC11 WG11.3 working conference on Database security IX : status and prospects: status and prospects
Communications of the ACM
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
Data dependency based logging for defensive information warfare
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 1
Reconstructing the Database after Electronic Attacks
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Reorganization of the database log for information warfare data recovery
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Data Dependency Based Recovery Approaches in Survival Database Systems
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
The implementation and evaluation of a recovery system for workflows
Journal of Network and Computer Applications
A Robust Damage Assessment Model for Corrupted Database Systems
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Hi-index | 0.00 |
Attack on information systems through electronic media has become epidemic with the explosion of Internet technologies and their applications. It is vital to start the assessment and recovery efforts immediately after an attack is detected. In this research, we consider dependency among data items to assess the damage. But the existing data dependency method is extremely limited. Therefore, in this paper, we have provided the theory and concepts needed to make this approach more robust and general. These include: classifications of read and write operations, a new definition of transaction and a new representation of the scheduler. Based on this developed theory, we have proposed an algorithm for damage assessment and recovery in a database that has suffered from information attack.