Skip Navigation

Scout Archives

Home Projects Publications Archives About Sign Up or Log In

Browse Resources

Database security.

View Resource Architectures for Intrusion Tolerant Database Systems

The Cyber Security Group at Pennsylvania State University is developing database software that can detect "attacks by malicious transactions" and repair the database with no interruption. This research paper proposes five different schemes for implementing such a system, with each one building on the previous. Some of the main goals for the schemes are automatic damage repair, attack isolation to...