Tracking and repairing damaged databases using before image table
M Xie, H Zhu, Y Feng, G Hu - 2008 Japan-China Joint …, 2008 - ieeexplore.ieee.org
Traditional damage assessment approaches can only locate damage caused by reading
corrupted data in a post-intrusion database. This paper indicates another kind of damage …
corrupted data in a post-intrusion database. This paper indicates another kind of damage …
A framework of survivability requirement specification for critical information systems
Y Zuo - 2010 43rd Hawaii International Conference on System …, 2010 - ieeexplore.ieee.org
Survivability represents a system's ability to provide essential services in the presence of
attacks and failures, and to recover full services in a timely manner when the environment …
attacks and failures, and to recover full services in a timely manner when the environment …
[PDF][PDF] A security requirements perspective towards a secured nosql database environment
Security has been and still remains a very pertinent issue to consider in database
management systems development especially those handling and storing large volumes of …
management systems development especially those handling and storing large volumes of …
Research on transaction dependency mechanism of self-healing database system
X Xia, Q Ji, J Le - 2012 International Conference on Systems …, 2012 - ieeexplore.ieee.org
Transaction Dependency is the base of the self-healing database system to do the selective
recovery after malicious attacks. According to the dependency of transactions, self-healing …
recovery after malicious attacks. According to the dependency of transactions, self-healing …
[PDF][PDF] What next in intrusion tolerance
P Pal, R Schantz, M Atighetchi, J Loyall… - BBN Technologies …, 2009 - wraits09.di.fc.ul.pt
Results• The system survived 75% of attacks• Of those that succeeded,• Average time to
failure was 45 minutes• Vs. immediately in the unprotected system• Minimum of 10 minutes …
failure was 45 minutes• Vs. immediately in the unprotected system• Minimum of 10 minutes …
Research on a new architecture of self-healing database system
X Xia, Q Ji, A Yang - 2012 Fifth International Symposium on …, 2012 - ieeexplore.ieee.org
Self-healing database can be self-selective repaired from malicious transactions attacks,
including some features like intrusion detection, intrusion limit, damage assessment and …
including some features like intrusion detection, intrusion limit, damage assessment and …
Dynamic damage recovery for web databases
In the web context, there is an urgent need for a self-healing database system which has the
ability to automatically locate and undo a set of transactions that are corrupted by malicious …
ability to automatically locate and undo a set of transactions that are corrupted by malicious …
[PDF][PDF] Survival of an Intrusion Tolerance Database System
ST Win - Survival, 2019 - academia.edu
While traditional secure database systems rely on prevention control and are very limited in
surviving malicious attack, an intrusion-tolerant database system can operate through …
surviving malicious attack, an intrusion-tolerant database system can operate through …