Damage assessment and repair in attack resilient distributed database systems

P Liu, M Yu - Computer Standards & Interfaces, 2011 - Elsevier
Preventive measures sometimes fail to defect malicious attacks. With attacks on data-
intensive applications becoming an ever more serious threat, intrusion tolerant database …

Modeling and evaluating the survivability of an intrusion tolerant database system

H Wang, P Liu - Computer Security–ESORICS 2006: 11th European …, 2006 - Springer
The immaturity of current intrusion detection techniques limits the traditional security systems
in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome …

A semi-markov survivability evaluation model for intrusion tolerant database systems

AH Wang, S Yan, P Liu - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
Survivability modeling and evaluation have gained increasing importance. Most existing
models assume that the distributions for transitions between states are exponential …

[PDF][PDF] 入侵容忍实时数据库的半马尔可夫生存能力评价模型

陈长清, 裴小兵, 周恒, 刘云生 - 计算机学报, 2011 - cjc.ict.ac.cn
摘要针对事务和数据的实时特性, 给出了具有入侵容忍能力的实时数据库系统的体系架构.
基于实时性的要求和入侵检测存在的延迟, 提出了半马尔可夫评价模型, 对实时数据库在入侵 …

Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies

H Wang, P Liu, L Li - International Journal of Information …, 2007 - inderscienceonline.com
The immaturity of current intrusion detection techniques limits traditional security
mechanisms in surviving malicious attacks. Intrusion tolerance approaches have emerged to …

[PDF][PDF] Architectures for self-healing databases under cyber attacks

P Liu, J Jing - International Journal of Computer Science and …, 2006 - Citeseer
In this paper, we propose five architectures for self-healing databases under malicious
attacks. While traditional secure database systems rely on prevention controls, a self-healing …

V2V: A second variation on query-by-humming

WP Birmingham, K O'Malley, JW Dunn… - … Joint Conference on …, 2003 - ieeexplore.ieee.org
Music information retrieval (MIR) systems tend to fall into two camps: that camp developing
cataloging and providing advanced access systems for large collections of music and that …

Survivability Evaluation Modeling Techniques and Measures

H Wang - Handbook of Research on Information Security and …, 2009 - igi-global.com
This chapter introduces the survivability evaluation, especially on the corresponding
evaluation criteria and modeling techniques. The content of this chapter includes an …

[引用][C] A Stochastic Model of the Damage Propagation in Database Systems.

AH Wang, S Yan - Security and Management, 2009