Principles of transaction-oriented database recovery
ACM Computing Surveys (CSUR)
Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
ACM Transactions on Database Systems (TODS)
Principles of distributed database systems (2nd ed.)
Principles of distributed database systems (2nd ed.)
Communications of the ACM
Communications of the ACM
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
The notions of consistency and predicate locks in a database system
Communications of the ACM
Fundamentals of Database Systems
Fundamentals of Database Systems
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Database System Concepts
Reconstructing the Database after Electronic Attacks
Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Extended data dependency approach: a robust way of rebuilding database
Proceedings of the 2002 ACM symposium on Applied computing
A data mining approach for database intrusion detection
Proceedings of the 2004 ACM symposium on Applied computing
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Unifying strategies and tactics: a survivability framework for countering cyber attacks
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Hi-index | 0.00 |
Using traditional logs that contain only before and after images of data items and record neither any of the read operations nor actual mathematical or logical operations associated with an update, a complete damage assessment and repair of the database is not possible in the post Information Warfare scenario. In this research, a new logging protocol is proposed which records all appropriate information required for the complete repair of a database that was updated by committed but affected transactions. This information includes various predicates and statements used in the transaction. An algorithm to incorporate these in the log is offered. Based on this new log, a method to perform damage assessment and recovery is presented.