Trusted Recovery Models
This chapter presents a framework for survivable database systems and trusted recovery. In particular, this chapter presents two trusted recovery models to support ‘undoing’ undesirable committed transactions, such as malicious transactions and affected good transactions. To make the framework more tangible, we first present the foundation upon which the trusted recovery framework is built. In particular, we explain what we mean by a database system and go into some details about our assumptions concerning database states, transactions, histories, and recovery models. We also explain what we mean by a database system that can survive IW attacks and go into some details about our assumptions concerning attacks, attack detection, and attack recovery.
KeywordsData Item Anomaly Detection Damage Assessment Integrity Constraint Recovery Model
Unable to display preview. Download preview PDF.
- 1.Note that the recovery model can be easily extended to incorporate histories of multilevel or nested transactions.Google Scholar