Trusted Recovery and Defensive Information Warfare / by Peng Liu, Sushil Jajodia.

Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the inte...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Main Author: Liu, Peng
Other Authors: Jajodia, Sushil
Format: eBook
Language:English
Published: Boston, MA : Springer US, 2002.
Series:Advances in information security ; 4.
Subjects:

MARC

LEADER 00000cam a2200000Mi 4500
001 b8005459
006 m o d
007 cr |||||||||||
008 130220s2002 mau o 000 0 eng
005 20240418145505.9
020 |a 9781475768800  |q (electronic bk.) 
020 |a 147576880X  |q (electronic bk.) 
020 |z 9781441949264 
020 |z 1441949267 
020 |z 147576880X 
024 7 |a 10.1007/978-1-4757-6880-0 
035 |a (OCoLC)spr851704820 
035 |a (OCoLC)851704820 
037 |a spr10.1007/978-1-4757-6880-0 
040 |a AU@  |b eng  |e pn  |c AU@  |d OCLCO  |d GW5XE  |d UA@  |d COO  |d OCLCQ  |d EBLCP  |d OCLCQ 
049 |a GWRE 
050 4 |a QA75.5-76.95 
100 1 |a Liu, Peng. 
245 1 0 |a Trusted Recovery and Defensive Information Warfare /  |c by Peng Liu, Sushil Jajodia. 
260 |a Boston, MA :  |b Springer US,  |c 2002. 
300 |a 1 online resource (xvi, 133 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Advances in Information Security,  |x 1568-2633 ;  |v 4. 
505 0 |a 1. Introduction -- 2. Background and Traditional System Recovery -- 3. Trusted Recovery Models -- 4. Trusted Recovery by Syntactic Approaches -- 5. Trusted Recovery by Rewriting Histories -- 6. Trusted Recovery in Distributed Systems -- 7. Conclusion. 
520 |a Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security. 
650 0 |a Computer science. 
650 0 |a Computer networks. 
650 0 |a Data structures (Computer science) 
650 0 |a Information theory. 
650 0 |a Information Systems. 
700 1 |a Jajodia, Sushil. 
776 0 8 |i Print version:  |z 9781441949264. 
830 0 |a Advances in information security ;  |v 4. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4757-6880-0  |z Full Text (via Springer) 
907 |a .b80054596  |b 07-02-19  |c 06-01-15 
998 |a web  |b 05-01-17  |c f  |d b   |e -  |f eng  |g mau  |h 0  |i 1 
915 |a M 
956 |a Springer e-books 
956 |b Springer Nature - Springer Book Archive - Springer Computer Science 
956 |a Computer Science 
956 |a Springer e-books: Archive 
999 f f |i 7ec3ca2d-0741-511b-932a-72d612e9ae82  |s 92317ee4-6ee8-54a0-bd84-20b42d099a29 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA75.5-76.95  |h Library of Congress classification  |i Ebooks, Prospector  |n 1