Skip Navigation

Home Projects Publications Archives About Sign Up or Log In

Architectures for Intrusion Tolerant Database Systems

The Cyber Security Group at Pennsylvania State University is developing database software that can detect "attacks by malicious transactions" and repair the database with no interruption. This research paper proposes five different schemes for implementing such a system, with each one building on the previous. Some of the main goals for the schemes are automatic damage repair, attack isolation to prevent multiple attacks of the same type, and damage containment during the repair process. One of the most active faculty members of the research group, Assistant Professor Peng Liu, is the author of this paper, which was presented at a conference in December 2002.
?  Cumulative Rating: (not yet rated)
Classification
Creator
Publisher
Date Issued [2002]
Data Type
Language
Scout Publication
Date of Scout Publication 2003-02-14
Archived Scout Publication URL https://scout.wisc.edu/report/nsdl/met/2003/0214

Resource Comments

(no comments available yet for this resource)