Background and Traditional System Recovery
Recovery methods have been studied extensively by researchers in fault tolerance and database areas. After a comprehensive introduction of the limitations of traditional mechanisms in trusted recovery, this chapter first addresses traditional recovery methods in the area of fault tolerance, then addresses traditional recovery methods in the area of databases. Some background in the areas of computer security and information warfare is also addressed.
KeywordsIntrusion Detection Integrity Constraint Recovery Method Trojan Horse Covert Channel
Unable to display preview. Download preview PDF.