• DocumentCode
    2084868
  • Title

    An architecture for making data available ceaselessly during recovery

  • Author

    Valsangkar, Amit ; Panda, Brajendra

  • Author_Institution
    Arkansas Univ., Fayetteville, AR, USA
  • fYear
    2003
  • fDate
    18-20 June 2003
  • Firstpage
    196
  • Lastpage
    202
  • Abstract
    Existing recovery schemes, developed for defensive information warfare scenario, range from completely prohibiting access to affected databases to prohibiting access specifically to damaged data items. In many cases this prohibition is undesirable. We have introduced a recovery model that can substantially reduce the database down-time during the recovery process, while attempting to provide repaired data as accurately as possible. The mechanism itself is divided into two activities. The first activity is the process of gathering summary information about all the database attributes, which is an on going process throughout the lifetime of the database. The second activity which occurs during and after an attack is recognized, providing acceptable values for damaged data items instantaneously, effectively keeping the database available at all times.
  • Keywords
    computer crime; database management systems; system recovery; transaction processing; damaged data items; data recovery; database attributes; database down-time; defensive information warfare scenario; fuzzy values; information attacks; recovery process; Computer crime; Computer hacking; Data security; Database systems; Distributed databases; Information security; Protection; Safety; Transaction databases; USA Councils;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
  • Print_ISBN
    0-7803-7808-3
  • Type

    conf

  • DOI
    10.1109/SMCSIA.2003.1232421
  • Filename
    1232421