A Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies
Conference Proceeding Article
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency relationships. The essential properties of our model is also discussed.
Data integrity, damage assessment, database recovery
Information Security and Trust
Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18: Proceedings
City or Country
FU, Ge; ZHU, Hong; and LI, Yingjiu.
A Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies. (2009). Information Systems Security: 5th International Conference, ICISS 2009 Kolkata, India, December 14-18: Proceedings. 5905, 237-251. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/303