Tracking and repairing damaged databases using before image table

M Xie, H Zhu, Y Feng, G Hu - 2008 Japan-China Joint …, 2008 - ieeexplore.ieee.org
Traditional damage assessment approaches can only locate damage caused by reading
corrupted data in a post-intrusion database. This paper indicates another kind of damage …

A framework of survivability requirement specification for critical information systems

Y Zuo - 2010 43rd Hawaii International Conference on System …, 2010 - ieeexplore.ieee.org
Survivability represents a system's ability to provide essential services in the presence of
attacks and failures, and to recover full services in a timely manner when the environment …

[PDF][PDF] A security requirements perspective towards a secured nosql database environment

P Kadebu, I Mapanga - International Conference of Advance …, 2014 - academia.edu
Security has been and still remains a very pertinent issue to consider in database
management systems development especially those handling and storing large volumes of …

Research on transaction dependency mechanism of self-healing database system

X Xia, Q Ji, J Le - 2012 International Conference on Systems …, 2012 - ieeexplore.ieee.org
Transaction Dependency is the base of the self-healing database system to do the selective
recovery after malicious attacks. According to the dependency of transactions, self-healing …

[PDF][PDF] What next in intrusion tolerance

P Pal, R Schantz, M Atighetchi, J Loyall… - BBN Technologies …, 2009 - wraits09.di.fc.ul.pt
Results• The system survived 75% of attacks• Of those that succeeded,• Average time to
failure was 45 minutes• Vs. immediately in the unprotected system• Minimum of 10 minutes …

Research on a new architecture of self-healing database system

X Xia, Q Ji, A Yang - 2012 Fifth International Symposium on …, 2012 - ieeexplore.ieee.org
Self-healing database can be self-selective repaired from malicious transactions attacks,
including some features like intrusion detection, intrusion limit, damage assessment and …

Dynamic damage recovery for web databases

H Zhu, G Fu, YC Feng, K Lü - Journal of Computer Science and …, 2010 - Springer
In the web context, there is an urgent need for a self-healing database system which has the
ability to automatically locate and undo a set of transactions that are corrupted by malicious …

[PDF][PDF] Survival of an Intrusion Tolerance Database System

ST Win - Survival, 2019 - academia.edu
While traditional secure database systems rely on prevention control and are very limited in
surviving malicious attack, an intrusion-tolerant database system can operate through …

[引用][C] 容忍入侵实时数据库系统的体系结构

陈长清, 刘晓锋, 刘云生, 裴小兵, 周恒 - NDBC2010 第27 届中国数据库 …, 2010 - 2010 年

[引用][C] 一种基于MM&MBPNN 的软件衰退预测方法研究

林已杰, 张为群, 周敏, 赖清 - 计算机科学, 2010