Trusted Recovery and Defensive Information Warfare:
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the inte...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer US
2002
|
Ausgabe: | 1st ed. 2002 |
Schriftenreihe: | Advances in Information Security
4 |
Schlagworte: | |
Online-Zugang: | UBY01 Volltext |
Zusammenfassung: | Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security |
Beschreibung: | 1 Online-Ressource (XVI, 133 p) |
ISBN: | 9781475768800 |
DOI: | 10.1007/978-1-4757-6880-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV047064331 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 201216s2002 |||| o||u| ||||||eng d | ||
020 | |a 9781475768800 |9 978-1-4757-6880-0 | ||
024 | 7 | |a 10.1007/978-1-4757-6880-0 |2 doi | |
035 | |a (ZDB-2-SCS)978-1-4757-6880-0 | ||
035 | |a (OCoLC)1227480007 | ||
035 | |a (DE-599)BVBBV047064331 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 004.0151 |2 23 | |
100 | 0 | |a Peng Liu |e Verfasser |4 aut | |
245 | 1 | 0 | |a Trusted Recovery and Defensive Information Warfare |c by Peng Liu, Sushil Jajodia |
250 | |a 1st ed. 2002 | ||
264 | 1 | |a New York, NY |b Springer US |c 2002 | |
300 | |a 1 Online-Ressource (XVI, 133 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in Information Security |v 4 | |
520 | |a Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security | ||
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Management of Computing and Information Systems | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a Computer Science, general | |
650 | 4 | |a Computer Communication Networks | |
650 | 4 | |a e-Commerce/e-business | |
650 | 4 | |a Computers | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Computer communication systems | |
650 | 4 | |a E-commerce | |
650 | 0 | 7 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Wiederherstellung |g Informatik |0 (DE-588)4177289-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jajodia, Sushil |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781441949264 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780792375722 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781475768817 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4757-6880-0 |x Verlag |z URL des Eerstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032471443 | ||
966 | e | |u https://doi.org/10.1007/978-1-4757-6880-0 |l UBY01 |p ZDB-2-SCS |q ZDB-2-SCS_2000/2004 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182062217822208 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Peng Liu Jajodia, Sushil |
author_facet | Peng Liu Jajodia, Sushil |
author_role | aut aut |
author_sort | Peng Liu |
author_variant | p l pl s j sj |
building | Verbundindex |
bvnumber | BV047064331 |
collection | ZDB-2-SCS |
ctrlnum | (ZDB-2-SCS)978-1-4757-6880-0 (OCoLC)1227480007 (DE-599)BVBBV047064331 |
dewey-full | 004.0151 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.0151 |
dewey-search | 004.0151 |
dewey-sort | 14.0151 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4757-6880-0 |
edition | 1st ed. 2002 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04160nmm a2200625zcb4500</leader><controlfield tag="001">BV047064331</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201216s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781475768800</subfield><subfield code="9">978-1-4757-6880-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4757-6880-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-1-4757-6880-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227480007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047064331</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.0151</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Peng Liu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trusted Recovery and Defensive Information Warfare</subfield><subfield code="c">by Peng Liu, Sushil Jajodia</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2002</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer US</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 133 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in Information Security</subfield><subfield code="v">4</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science, general</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">e-Commerce/e-business</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">E-commerce</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Wiederherstellung</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4177289-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jajodia, Sushil</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781441949264</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780792375722</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781475768817</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4757-6880-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Eerstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032471443</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4757-6880-0</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">ZDB-2-SCS_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047064331 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:12:22Z |
indexdate | 2024-07-10T09:01:34Z |
institution | BVB |
isbn | 9781475768800 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032471443 |
oclc_num | 1227480007 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource (XVI, 133 p) |
psigel | ZDB-2-SCS ZDB-2-SCS_2000/2004 ZDB-2-SCS ZDB-2-SCS_2000/2004 |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Springer US |
record_format | marc |
series2 | Advances in Information Security |
spelling | Peng Liu Verfasser aut Trusted Recovery and Defensive Information Warfare by Peng Liu, Sushil Jajodia 1st ed. 2002 New York, NY Springer US 2002 1 Online-Ressource (XVI, 133 p) txt rdacontent c rdamedia cr rdacarrier Advances in Information Security 4 Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system. Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted recovery, except for complete rollbacks, which undo the work of benign transactions as well as malicious ones, and compensating transactions, whose utility depends on application semantics. Database trusted recovery faces a set of unique challenges. In particular, trusted database recovery is complicated mainly by (a) the presence of benign transactions that depend, directly or indirectly on malicious transactions; and (b) the requirement by many mission-critical database applications that trusted recovery should be done on-the-fly without blocking the execution of new user transactions. Trusted Recovery And Defensive Information Warfare proposes a new model and a set of innovative algorithms for database trusted recovery. Both read-write dependency based and semantics based trusted recovery algorithms are proposed. Both static and dynamic database trusted recovery algorithms are proposed. These algorithms can typically save a lot of work by innocent users and can satisfy a variety of attack recovery requirements of real world database applications. Trusted Recovery And Defensive Information Warfare is suitable as a secondary text for a graduate level course in computer science, and as a reference for researchers and practitioners in information security Theory of Computation Management of Computing and Information Systems Data Structures and Information Theory Computer Science, general Computer Communication Networks e-Commerce/e-business Computers Management information systems Computer science Data structures (Computer science) Computer communication systems E-commerce Wiederherstellung Informatik (DE-588)4177289-1 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Information warfare (DE-588)4461975-3 s Wiederherstellung Informatik (DE-588)4177289-1 s DE-604 Jajodia, Sushil aut Erscheint auch als Druck-Ausgabe 9781441949264 Erscheint auch als Druck-Ausgabe 9780792375722 Erscheint auch als Druck-Ausgabe 9781475768817 https://doi.org/10.1007/978-1-4757-6880-0 Verlag URL des Eerstveröffentlichers Volltext |
spellingShingle | Peng Liu Jajodia, Sushil Trusted Recovery and Defensive Information Warfare Theory of Computation Management of Computing and Information Systems Data Structures and Information Theory Computer Science, general Computer Communication Networks e-Commerce/e-business Computers Management information systems Computer science Data structures (Computer science) Computer communication systems E-commerce Wiederherstellung Informatik (DE-588)4177289-1 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4177289-1 (DE-588)4461975-3 |
title | Trusted Recovery and Defensive Information Warfare |
title_auth | Trusted Recovery and Defensive Information Warfare |
title_exact_search | Trusted Recovery and Defensive Information Warfare |
title_exact_search_txtP | Trusted Recovery and Defensive Information Warfare |
title_full | Trusted Recovery and Defensive Information Warfare by Peng Liu, Sushil Jajodia |
title_fullStr | Trusted Recovery and Defensive Information Warfare by Peng Liu, Sushil Jajodia |
title_full_unstemmed | Trusted Recovery and Defensive Information Warfare by Peng Liu, Sushil Jajodia |
title_short | Trusted Recovery and Defensive Information Warfare |
title_sort | trusted recovery and defensive information warfare |
topic | Theory of Computation Management of Computing and Information Systems Data Structures and Information Theory Computer Science, general Computer Communication Networks e-Commerce/e-business Computers Management information systems Computer science Data structures (Computer science) Computer communication systems E-commerce Wiederherstellung Informatik (DE-588)4177289-1 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Theory of Computation Management of Computing and Information Systems Data Structures and Information Theory Computer Science, general Computer Communication Networks e-Commerce/e-business Computers Management information systems Computer science Data structures (Computer science) Computer communication systems E-commerce Wiederherstellung Informatik Information warfare |
url | https://doi.org/10.1007/978-1-4757-6880-0 |
work_keys_str_mv | AT pengliu trustedrecoveryanddefensiveinformationwarfare AT jajodiasushil trustedrecoveryanddefensiveinformationwarfare |