Abstract
This chapter presents a framework for survivable database systems and trusted recovery. In particular, this chapter presents two trusted recovery models to support ‘undoing’ undesirable committed transactions, such as malicious transactions and affected good transactions. To make the framework more tangible, we first present the foundation upon which the trusted recovery framework is built. In particular, we explain what we mean by a database system and go into some details about our assumptions concerning database states, transactions, histories, and recovery models. We also explain what we mean by a database system that can survive IW attacks and go into some details about our assumptions concerning attacks, attack detection, and attack recovery.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Notes
Note that the recovery model can be easily extended to incorporate histories of multilevel or nested transactions.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Liu, P., Jajodia, S. (2002). Trusted Recovery Models. In: Trusted Recovery and Defensive Information Warfare. Advances in Information Security, vol 4. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-6880-0_3
Download citation
DOI: https://doi.org/10.1007/978-1-4757-6880-0_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4926-4
Online ISBN: 978-1-4757-6880-0
eBook Packages: Springer Book Archive