[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article
Free access

Trusted recovery

Published: 01 July 1999 Publication History
First page of PDF

References

[1]
Ammann, P. and Jajodia, S. and McCollum, C.D. and Blaustein, B.T. Surviving informationwarfare attacks on databases. In Proceedings oft he IEEE Symposium on Security and Privacy (Oakland, CA, 1997), 164-174.
[2]
Ammann, P. and Jajodia, S. and Ray, I. Applying formal methods to semantic-based decomposition of transactions. TODS 22, 2 (June), 215-254.
[3]
Garcia-Molina, H. and Salem, K. Sagas. In Proceedings ofthe ACM SIG- MOD International Conj~rence on Management of Data. (San Francisco, 1987), 249-259.
[4]
Gray, J. and Reuter, A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, San Mateo, CA, 1993.
[5]
Lee, P.A. and Anderson, T. Fault Tolerance: Principles and Practice, 2d. ed., 1990.

Cited By

View all
  • (2018)Integration of Information Systems and Cybersecurity CountermeasuresACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3184444.318444849:1(33-52)Online publication date: 1-Feb-2018
  • (2015)An Agent Based Approach to Perform Damage Assessment and Recovery Efficiently after a Cyber Attack to Ensure E-government Database SecurityProceedings of the 2015 48th Hawaii International Conference on System Sciences10.1109/HICSS.2015.272(2272-2279)Online publication date: 5-Jan-2015
  • (2014)Incident-centered information securityInformation and Management10.1016/j.im.2013.11.00451:1(138-151)Online publication date: 1-Jan-2014
  • Show More Cited By

Recommendations

Reviews

Stanley A. Kurzban

Although this short, well-written paper provides those responsible for system security with a generally useful typology of strategies for the defense of computers and for recovery from successful attacks, its primary focus is on database management systems (DBMSs). While the discussion is accurate and helpful, effective recovery is so dependent on details of applications and DBMS facilities that readers faced with practical problems will find little help in the text.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 42, Issue 7
July 1999
96 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/306549
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 July 1999
Published in CACM Volume 42, Issue 7

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)154
  • Downloads (Last 6 weeks)49
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Integration of Information Systems and Cybersecurity CountermeasuresACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3184444.318444849:1(33-52)Online publication date: 1-Feb-2018
  • (2015)An Agent Based Approach to Perform Damage Assessment and Recovery Efficiently after a Cyber Attack to Ensure E-government Database SecurityProceedings of the 2015 48th Hawaii International Conference on System Sciences10.1109/HICSS.2015.272(2272-2279)Online publication date: 5-Jan-2015
  • (2014)Incident-centered information securityInformation and Management10.1016/j.im.2013.11.00451:1(138-151)Online publication date: 1-Jan-2014
  • (2013)A Data Intensive Statistical Aggregation EngineProceedings of the 2013 IEEE 27th International Symposium on Parallel and Distributed Processing Workshops and PhD Forum10.1109/IPDPSW.2013.87(2157-2164)Online publication date: 20-May-2013
  • (2013)Incorporation of Application Specific Information for Recovery in Database from Malicious TransactionsInformation Security Journal: A Global Perspective10.1080/19393555.2013.78172122:1(35-45)Online publication date: 1-Jan-2013
  • (2013)WITHDRAWN: Risk analysis and damage assessment of financial institutions in cyber attacks between nationsMathematical and Computer Modelling10.1016/j.mcm.2012.06.00758:11-12(1845)Online publication date: Dec-2013
  • (2013)Component survivability at runtime for mission-critical distributed systemsThe Journal of Supercomputing10.1007/s11227-012-0818-266:3(1390-1417)Online publication date: 1-Dec-2013
  • (2010)A forensic approach to incident response2010 Information Security Curriculum Development Conference10.1145/1940941.1940975(177-185)Online publication date: 1-Oct-2010
  • (2010)A Study on Risk Analysis and Assessment of Damages to Cyber Attack2010 International Conference on Information Science and Applications10.1109/ICISA.2010.5480348(1-6)Online publication date: Apr-2010
  • (2010)Design and Implementation of Scenario-Based Collaborative Framework: XCREAM2010 International Conference on Information Science and Applications10.1109/ICISA.2010.5480304(1-8)Online publication date: Apr-2010
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media