Publication Type

Conference Proceeding Article

Version

publishedVersion

Publication Date

12-2009

Abstract

An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency relationships. The essential properties of our model is also discussed.

Keywords

Data integrity, database recovery, damage assessment

Discipline

Databases and Information Systems | Data Storage Systems

Research Areas

Cybersecurity

Publication

Proceedings of the 5th International Conference on Information Systems Security, Calcutta, India, 2009 December 14-18

First Page

237

Last Page

251

ISBN

9783642107719

Identifier

10.1007/978-3-642-10772-6_18

Publisher

Springer Verlag

City or Country

Calcutta, India

Additional URL

https://doi.org/10.1007/978-3-642-10772-6_18

Share

COinS