Abstract
After constructing the foundation of the proposed trusted recovery scheme and formalizing ‘undoing committed transactions’, the fundamental trusted recovery operation, in Chapter 3, this chapter turns to address concrete trusted recovery mechanisms. In particular, this chapter presents the syntactic aspect of the proposed scheme where both ColdStart and WarmStart recovery algorithms are developed, but only syntactic dependencies between transactions are exploited. Moreover, we outline various possibilities for maintaining read-from dependency information. Although direct logging of transaction reads has the value of simplicity, the performance degradation of such an approach may be too severe in some cases. For this reason, we show that offline analysis can efficiently meet the need for establishing read-from dependency information. We illustrate the practicality of such an approach via a study on standard benchmarks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Notes
A transaction blindly writes a data item if it writes a value without first reading the item.
The termination conditions are stated in Mechanism 2.
We have developed an intrusion detector prototype where a rule-based mechanism is used to integrate existing anomaly detection algorithms and exploit application semantics.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer Science+Business Media New York
About this chapter
Cite this chapter
Liu, P., Jajodia, S. (2002). Trusted Recovery by Syntactic Approaches. In: Trusted Recovery and Defensive Information Warfare. Advances in Information Security, vol 4. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-6880-0_4
Download citation
DOI: https://doi.org/10.1007/978-1-4757-6880-0_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4926-4
Online ISBN: 978-1-4757-6880-0
eBook Packages: Springer Book Archive