Sciweavers

71 search results - page 1 / 15
» Recovery from Malicious Transactions
Sort
View
TKDE
2002
67views more  TKDE 2002»
13 years 4 months ago
Recovery from Malicious Transactions
Preventive measures sometimes fail to deflect malicious attacks. In this paper, we adopt an information warfare perspective, which assumes success by the attacker in achieving part...
Paul Ammann, Sushil Jajodia, Peng Liu
BNCOD
2004
65views Database» more  BNCOD 2004»
13 years 5 months ago
Reducing Damage Assessment Latency in Survivable Databases
Abstract. Traditional recovery mechanisms are not adequate in protecting databases from malicious attacks. A malicious transaction by virtue of writing on to the database can corru...
Indrakshi Ray, Ross M. McConnell, Monte Lunacek, V...
SIGMOD
2006
ACM
129views Database» more  SIGMOD 2006»
14 years 4 months ago
Recovery from "bad" user transactions
User written transaction code is responsible for the "C" in ACID transactions, i.e., taking the database from one consistent state to the next. However, user transaction...
David B. Lomet, Zografoula Vagena, Roger S. Barga
ACSAC
2006
IEEE
13 years 10 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
ACSAC
2005
IEEE
13 years 10 months ago
Defensive Execution of Transactional Processes against Attacks
It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the...
Meng Yu, Wanyu Zang, Peng Liu