Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Access methods for multiversion data
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
ACM Transactions on Database Systems (TODS)
Temporal databases: theory, design, and implementation
Temporal databases: theory, design, and implementation
The Implementation of POSTGRES
IEEE Transactions on Knowledge and Data Engineering
The Design of the POSTGRES Storage System
VLDB '87 Proceedings of the 13th International Conference on Very Large Data Bases
Exploiting A History Database for Backup
VLDB '93 Proceedings of the 19th International Conference on Very Large Data Bases
Using Codewords to Protect Database Data from a Class of Software Errors
ICDE '99 Proceedings of the 15th International Conference on Data Engineering
Transaction Time Support Inside a Database Engine
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Graceful degradation via versions: specifications and implementations
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Transaction time indexing with version compression
Proceedings of the VLDB Endowment
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Effective and efficient compromise recovery for weakly consistent replication
Proceedings of the 4th ACM European conference on Computer systems
A Robust Damage Assessment Model for Corrupted Database Systems
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
BIS'07 Proceedings of the 10th international conference on Business information systems
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
PolicyReplay: misconfiguration-response queries for data breach reporting
Proceedings of the VLDB Endowment
The deltagrid abstract execution model: service composition and process interference handling
ER'06 Proceedings of the 25th international conference on Conceptual Modeling
Expedited rating of data stores using agile data loading techniques
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Hi-index | 0.00 |
User written transaction code is responsible for the "C" in ACID transactions, i.e., taking the database from one consistent state to the next. However, user transactions can be flawed and lead to inconsistent (or invalid) states. Database systems usually correct invalid data using "point in time" recovery, a costly process that installs a backup and rolls it forward. The result is long outages and the "de-commit" of many valid transactions, which must then be re-submitted, frequently manually. We have implemented in our transaction-time database system a technique in which only data tainted by a flawed transaction and transactions dependent upon its updates are "removed". This process identifies and quarantines tainted data despite the complication of determining transactions dependent on data written by the flawed transaction. A further property of our implementation is that no backup needs to be installed for this because the prior transaction-time states provide an online backup.