Database and Application Security XV 2002
DOI: 10.1007/978-0-387-35587-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Reorganization of the Database Log for Information Warfare Data Recovery

Abstract: Abstract:Using traditional logs that contain only before and after images of data items and record neither any of the read operations nor actual mathematical or logical operations associated with an update, a complete damage assessment and repair of the database is not possible in the post Information Warf are scenario. In this research, a new logging protocol is proposed which records all appropriate information required for the complete repair of a database that was updated by committed but affected transact… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…On the other hand, most of the data dependency approaches [27,28] are variants of the approach proposed in [26]. Although these methods succeed in restoring the consistency of a database compromised by some malicious transaction(s), they require maintenance and management of large log size that leads to considerable damage assessment overhead and degradation in regular transaction processing performance.…”
Section: -Database Recovery After Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, most of the data dependency approaches [27,28] are variants of the approach proposed in [26]. Although these methods succeed in restoring the consistency of a database compromised by some malicious transaction(s), they require maintenance and management of large log size that leads to considerable damage assessment overhead and degradation in regular transaction processing performance.…”
Section: -Database Recovery After Attackmentioning
confidence: 99%
“…Over the last decade, several methodologies have been proposed to recover consistency from committed malicious transactions [14][15][16][17][18][19][20][21][22][23][24][25][26][27][28]. These approaches can be broadly classified into two categories, namely, transaction dependency and data dependency-based recovery.…”
Section: -Database Recovery After Attackmentioning
confidence: 99%
“…Transaction level attacks are not new. They have been studied in a good number of researches [2,8,22]. Transaction level attacks can be done through a variety of ways:…”
Section: The Threat Modelmentioning
confidence: 99%
“…Transaction level attacks are not new. They have been studied in a good number of researches [4][11] [14]. Transaction level attacks can be done through a variety of ways.…”
Section: The Threat Modelmentioning
confidence: 99%