73,239 Hits in 3.2 sec

Data Dependency Based Recovery Approaches in Survival Database Systems [chapter]

Jiping Zheng, Xiaolin Qin, Jin Sun
2007 Lecture Notes in Computer Science  
Recovering from malicious attacks in survival database systems is vital in mission-critical information systems.  ...  In this paper, two efficient approaches -transaction dependency based and data dependency based are proposed.  ...  in different recovery processes Traditional undo and re-execute method Transaction based recovery method Data dependency based approach without blind writes Data dependency based approach  ... 
doi:10.1007/978-3-540-72586-2_158 fatcat:6dd3zxkh7ffjrigk3czd5rnvey

Dynamic data recovery for database systems based on fine grained transaction log

Hong Zhu, Ge Fu, Yi Zhu, Renchao Jin, Kevin Lü, Jie Shi
2008 Proceedings of the 2008 international symposium on Database engineering & applications - IDEAS '08  
Survivability and availability are essential for modern DBMSs, which require the database provide continuous services in the period of recovery, namely dynamic recovery.  ...  In this paper, we presented a data recovery model and introduce extended read-write dependency and phantoms dependency to the model. A fine grained transaction log is proposed for data recovery.  ...  Approaches for damage assessment in existing recovery models [1, 3, 6, 7] are based on dependencies between transactions.  ... 
doi:10.1145/1451940.1451975 dblp:conf/ideas/ZhuFZJLS08 fatcat:gwcb464dbzey7jk7luarivdona

Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System [chapter]

Hai Wang, Peng Liu
2006 Lecture Notes in Computer Science  
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks.  ...  Before intrusion tolerance is accepted as an approach to security, there must be quantitative techniques to measure its survivability.  ...  [17] proposed a data mining approach for detecting malicious transactions in a database system. Their approach is to mine data dependencies among data items in the database.  ... 
doi:10.1007/11863908_14 fatcat:4ix6lyxp2bfbjngysmxo7hiffm

Research on Real-Time Database Recovery Method of Smart Grid System Based on IEC61970 Standard

Shuqing Lin, Allam Maalla, Guangyu Wu
2019 IOP Conference Series: Earth and Environment  
Research on real-time database recovery Method of Smart Grid system is based on IEC61970 standard using RFID algorithm.  ...  Therefore, real-time database recovery Method plays an important role in power grid dispatching system.  ...  Data recovery algorithm based on IEC61970 standard is applied in smart grid system to improve the survivability of real-time databases and the automation level of grid dispatching.  ... 
doi:10.1088/1755-1315/242/2/022046 fatcat:ygsis673rrf6vhgm53dfccbr64

TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead [chapter]

Kun Bai, Meng Yu, Peng Liu
2008 Lecture Notes in Computer Science  
In this paper, we propose TRACE, a zero-system-down-time database damage tracking, quarantine, and recovery solution with negligible run time overhead.  ...  As Web services gain popularity in today's E-Business world, surviving DBMSs from an attack is becoming crucial because of the increasingly critical role that database servers are playing.  ...  This work was supported by NSF CNS-0716479, AFOSR MURI: Autonomic Recovery of Enterprise-wide Systems After Attack or Failure with Forward Correction, and AFRL award FA8750-08-C-0137.  ... 
doi:10.1007/978-3-540-88313-5_11 fatcat:zountszynbbtxgtq2hzgfpqqia

Page 453 of Mathematical Reviews Vol. , Issue 89A [page]

1989 Mathematical Reviews  
Summary: “We present an approach to concurrency control based on the decomposition of both the database and the individual transactions.  ...  The combined structure makes it possible to use inverse search (in the relational part) in order to accelerate query responses and to reduce the size of the database by representing some of the data in  ... 

A Comparison of Intrusion-Tolerant System Architectures

Quyen Nguyen, Arun Sood
2011 IEEE Security and Privacy  
Recovery-based 4. Hybrid Using the above approach, we classify ITS architectures, several of which were part of the OASIS project funded by DARPA [1]. Detection-triggered.  ...  Therefore, security is critical in order to ensure confidentiality, integrity, and availability for system data and services.  ...  PASIS [1] employs threshold secret sharing scheme to encode and disperse data in survivable storage systems.  ... 
doi:10.1109/msp.2010.145 fatcat:xnib3bv36fhzxjor24iry6onfy

A Fault-Tolerant Distributed Legacy-Based System and Its Evaluation [chapter]

Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano
2003 Lecture Notes in Computer Science  
In this paper, we present a complete architecture for improving the dependability of complex COTS and legacy-based systems.  ...  An experimental prototype deployed over a COTS-based LAN is described and has allowed a dependability analysis, via combined use of direct measurements and analytical modeling.  ...  ) errors in the physical database (i.e., corrupted data in the system stable storage).  ... 
doi:10.1007/978-3-540-45214-0_22 fatcat:a7y3dojh4rcdborex6iaa23i4i

Procrastination — catch that timely thief

Lyndon Jones
1981 Education + Training  
NVM invites database systems to manipulate durable data directly via load and store instructions, but overheads due to the widely used mechanisms that ensure consistent recovery from failures impair performance  ...  Preserving the integrity of application data across updates in the presence of failure is an essential function of computing systems, and byte-addressable non-volatile memory (NVM) broadens the range of  ...  NEW HARDWARE & SOFTWARE Database management systems are designed to survive severe failures, e.g., power outages.  ... 
doi:10.1108/eb016841 fatcat:556zs2gcz5aw3faqfht5rerxja

Towards Database Firewall: Mining the Damage Spreading Patterns

Kun Bai, Peng Liu
2006 Proceedings of the Computer Security Applications Conference  
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems.  ...  Our approach provides a probability based strategy to estimate the data integrity on the fly.  ...  Acknowledgement This work was supported in part by NSF CCR-TC-0233324. And we wish to thank Elisa Bertino, Ashish Kamra and Xiangji Huang very much for kindly sharing the clinic OLTP data with us.  ... 
doi:10.1109/acsac.2006.52 dblp:conf/acsac/BaiL06 fatcat:jukkq6prafhhfdolhteizsdn5u

A Review on Fault Tolerance in Distributed Database

2021 International Journal of Advanced Trends in Computer Science and Engineering  
In this paper, we study about the different types of fault tolerance techniques which are used in various distributed database systems.  ...  The main focus of this research is about how the data are storedin the servers, fault detection techniques and the recovery techniques used. A fault can occur for many reasons.  ...  For the data recovery, this technique uses RDOR-based Data Recovery which acquires less transmissions during reconstruction.  ... 
doi:10.30534/ijatcse/2021/071032021 fatcat:e4kyqfepn5gc7c2q7qf4k5jn24

Availability measurement and modeling for an application server

Dong Tang, D. Kumar, S. Duvur, O. Torbjornsen
2004 International Conference on Dependable Systems and Networks, 2004  
This paper presents a measurement-based availability modeling and analysis for a fault tolerant Application Server system -Sun Java System Application Server, Enterprise Edition 7.  ...  As demonstrated in this paper, the combined use of lab measurement, analytical modeling, and uncertainty analysis is a useful evaluation approach which can provide a conservative availability assessment  ...  Thanks are also due to Kenneth Chan and Suveen Nadipalli for participating the early model development and providing the JSAS EE7 test data.  ... 
doi:10.1109/dsn.2004.1311937 dblp:conf/dsn/TangKDT04 fatcat:p67sfyxun5hk3e2dief2p3giaq


Alfred Z. Spector, Peter M. Schwarz
1983 ACM SIGOPS Operating Systems Review  
Though much is known about communication in transaction-based distributed databases [Lindsay 79, Gray 78], more general transaction-based systems have additional communication requirements and their communication  ...  Transactions have proven to be a useful tool for constructing reliable database systems and are likely to be useful in many types of distributed systems.  ...  Acknowledgments We gratefully acknowledge the contributions of Dean Daniels and Cynthia Hibbard, who helped us organize and present the ideas in this paper.  ... 
doi:10.1145/1041478.1041481 fatcat:p5movi7acnc25g3q6f7pzcaho4

Survivability and scalability of space networks: a survey

Md. Shohrab Hossain, Shaikh Shahriar Hassan, Mohammed Atiquzzaman, William Ivancic
2017 Telecommunications Systems  
However, most of network survivability and scalability analysis are based on terrestrial networks. We have listed various approaches used in those analysis.  ...  In future, these data will be accessed by terrestrial users through the Internet.  ...  Loca- tion database may be invalid for longer period if refreshing period is high DNS-based DNS can be used as location database instead of HA in hostile environment In-depth understanding and compari  ... 
doi:10.1007/s11235-017-0396-y fatcat:r7rcpnfzpjhovhr62svzlqqpjq

Guaranteeing Recoverability via Partially Constrained Transaction Logs [article]

H. Zhou, J. W. Guo, H. Q. Hu, W. N. Qian, X. Zhou, A. Y. Zhou
2019 arXiv   pre-print
It always has a considerable impact on performance, especially in an in-memory database system.  ...  can concurrently restore a consistent database state based on the partially constrained logs after a crash.  ...  In an in-memory database system, undo log is not necessary, because the system does not need to flush uncommitted data into the durable storage.  ... 
arXiv:1901.06491v1 fatcat:oipqkyq7rrdy7dha3eeypbdjeu
« Previous Showing results 1 — 15 out of 73,239 results