Back to Search Start Over

A Robust Damage Assessment Model for Corrupted Database Systems.

Authors :
Fu, Ge
Zhu, Hong
Li, Yingjiu
Source :
Information Systems Security (9783642107719); 2009, p237-251, 15p
Publication Year :
2009

Abstract

An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency relationships. The essential properties of our model is also discussed. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783642107719
Database :
Complementary Index
Journal :
Information Systems Security (9783642107719)
Publication Type :
Book
Accession number :
76742927
Full Text :
https://doi.org/10.1007/978-3-642-10772-6_18