Advertisement

Background and Traditional System Recovery

  • Peng Liu
  • Sushil Jajodia
Part of the Advances in Information Security book series (ADIS, volume 4)

Abstract

Recovery methods have been studied extensively by researchers in fault tolerance and database areas. After a comprehensive introduction of the limitations of traditional mechanisms in trusted recovery, this chapter first addresses traditional recovery methods in the area of fault tolerance, then addresses traditional recovery methods in the area of databases. Some background in the areas of computer security and information warfare is also addressed.

Keywords

Intrusion Detection Integrity Constraint Recovery Method Trojan Horse Covert Channel 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2002

Authors and Affiliations

  • Peng Liu
    • 1
  • Sushil Jajodia
    • 2
    • 3
  1. 1.Department of Information SystemsUniversity of MarylandBaltimore CountyUSA
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityUSA
  3. 3.Department of Information & Software EngineeringGeorge Mason UniversityFairfaxUSA

Personalised recommendations