DocumentCode
2084868
Title
An architecture for making data available ceaselessly during recovery
Author
Valsangkar, Amit ; Panda, Brajendra
Author_Institution
Arkansas Univ., Fayetteville, AR, USA
fYear
2003
fDate
18-20 June 2003
Firstpage
196
Lastpage
202
Abstract
Existing recovery schemes, developed for defensive information warfare scenario, range from completely prohibiting access to affected databases to prohibiting access specifically to damaged data items. In many cases this prohibition is undesirable. We have introduced a recovery model that can substantially reduce the database down-time during the recovery process, while attempting to provide repaired data as accurately as possible. The mechanism itself is divided into two activities. The first activity is the process of gathering summary information about all the database attributes, which is an on going process throughout the lifetime of the database. The second activity which occurs during and after an attack is recognized, providing acceptable values for damaged data items instantaneously, effectively keeping the database available at all times.
Keywords
computer crime; database management systems; system recovery; transaction processing; damaged data items; data recovery; database attributes; database down-time; defensive information warfare scenario; fuzzy values; information attacks; recovery process; Computer crime; Computer hacking; Data security; Database systems; Distributed databases; Information security; Protection; Safety; Transaction databases; USA Councils;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN
0-7803-7808-3
Type
conf
DOI
10.1109/SMCSIA.2003.1232421
Filename
1232421
Link To Document