Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents(7 chapters)
About this book
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions.
Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications.
Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security.
Authors and Affiliations
-
Department of Information Systems, University of Maryland, Baltimore County, USA
Peng Liu
-
Center for Secure Information Systems, George Mason University, USA
Sushil Jajodia
-
Department of Information & Software Engineering, George Mason University, Fairfax, USA
Sushil Jajodia
About the authors
Bibliographic Information
Book Title: Trusted Recovery and Defensive Information Warfare
Authors: Peng Liu, Sushil Jajodia
Series Title: Advances in Information Security
DOI: https://doi.org/10.1007/978-1-4757-6880-0
Publisher: Springer New York, NY
-
eBook Packages: Springer Book Archive
Copyright Information: Springer-Verlag US 2002
Hardcover ISBN: 978-0-7923-7572-2Published: 30 November 2001
Softcover ISBN: 978-1-4419-4926-4Published: 08 December 2010
eBook ISBN: 978-1-4757-6880-0Published: 14 March 2013
Series ISSN: 1568-2633
Series E-ISSN: 2512-2193
Edition Number: 1
Number of Pages: XVI, 133
Topics: Theory of Computation, Management of Computing and Information Systems, Data Structures and Information Theory, Computer Science, general, Computer Communication Networks, e-Commerce/e-business