Advertisement

Trusted Recovery by Syntactic Approaches

  • Peng Liu
  • Sushil Jajodia
Part of the Advances in Information Security book series (ADIS, volume 4)

Abstract

After constructing the foundation of the proposed trusted recovery scheme and formalizing ‘undoing committed transactions’, the fundamental trusted recovery operation, in Chapter 3, this chapter turns to address concrete trusted recovery mechanisms. In particular, this chapter presents the syntactic aspect of the proposed scheme where both ColdStart and WarmStart recovery algorithms are developed, but only syntactic dependencies between transactions are exploited. Moreover, we outline various possibilities for maintaining read-from dependency information. Although direct logging of transaction reads has the value of simplicity, the performance degradation of such an approach may be too severe in some cases. For this reason, we show that offline analysis can efficiently meet the need for establishing read-from dependency information. We illustrate the practicality of such an approach via a study on standard benchmarks.

Keywords

Data Item Read Operation Input Argument Syntactic Approach Transaction Type 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. 1.
    A transaction blindly writes a data item if it writes a value without first reading the item.Google Scholar
  2. 2.
    The termination conditions are stated in Mechanism 2.Google Scholar
  3. 3.
    We have developed an intrusion detector prototype where a rule-based mechanism is used to integrate existing anomaly detection algorithms and exploit application semantics.Google Scholar

Copyright information

© Springer Science+Business Media New York 2002

Authors and Affiliations

  • Peng Liu
    • 1
  • Sushil Jajodia
    • 2
    • 3
  1. 1.Department of Information SystemsUniversity of MarylandBaltimore CountyUSA
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityUSA
  3. 3.Department of Information & Software EngineeringGeorge Mason UniversityFairfaxUSA

Personalised recommendations