Trusted Recovery Models

  • Peng Liu
  • Sushil Jajodia
Part of the Advances in Information Security book series (ADIS, volume 4)

Abstract

This chapter presents a framework for survivable database systems and trusted recovery. In particular, this chapter presents two trusted recovery models to support ‘undoing’ undesirable committed transactions, such as malicious transactions and affected good transactions. To make the framework more tangible, we first present the foundation upon which the trusted recovery framework is built. In particular, we explain what we mean by a database system and go into some details about our assumptions concerning database states, transactions, histories, and recovery models. We also explain what we mean by a database system that can survive IW attacks and go into some details about our assumptions concerning attacks, attack detection, and attack recovery.

Keywords

Dura 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. 1.
    Note that the recovery model can be easily extended to incorporate histories of multilevel or nested transactions.Google Scholar

Copyright information

© Springer Science+Business Media New York 2002

Authors and Affiliations

  • Peng Liu
    • 1
  • Sushil Jajodia
    • 2
    • 3
  1. 1.Department of Information SystemsUniversity of MarylandBaltimore CountyUSA
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityUSA
  3. 3.Department of Information & Software EngineeringGeorge Mason UniversityFairfaxUSA

Personalised recommendations