Trusted Recovery by Syntactic Approaches
After constructing the foundation of the proposed trusted recovery scheme and formalizing ‘undoing committed transactions’, the fundamental trusted recovery operation, in Chapter 3, this chapter turns to address concrete trusted recovery mechanisms. In particular, this chapter presents the syntactic aspect of the proposed scheme where both ColdStart and WarmStart recovery algorithms are developed, but only syntactic dependencies between transactions are exploited. Moreover, we outline various possibilities for maintaining read-from dependency information. Although direct logging of transaction reads has the value of simplicity, the performance degradation of such an approach may be too severe in some cases. For this reason, we show that offline analysis can efficiently meet the need for establishing read-from dependency information. We illustrate the practicality of such an approach via a study on standard benchmarks.
KeywordsData Item Read Operation Input Argument Syntactic Approach Transaction Type
Unable to display preview. Download preview PDF.
- 1.A transaction blindly writes a data item if it writes a value without first reading the item.Google Scholar
- 2.The termination conditions are stated in Mechanism 2.Google Scholar
- 3.We have developed an intrusion detector prototype where a rule-based mechanism is used to integrate existing anomaly detection algorithms and exploit application semantics.Google Scholar