Databases Reference
In-Depth Information
63. CA data availability solutions.
http://www3.ca.com/solutions/SubSolution.aspx?ID=312
64. Symantec livestate recovery products provide fast, reliable and cost-effective sys-
tem and data recovery. http://www.symantec.com/press/2004/n041005.html
65. Sonasoft disaster recovery solutions.
http://www.sonasoft.com/solutions/disaster.asp
66. Zhu, N., Chiueh, T.C.: Design, implementation, and evaluation of repairable
file service. In: Proceedings of the IEEE Dependable Systems and Networks.
(2003)
67. Goel, A., Po, K., Farhadi, K., Li, Z., Lara, E.D.: The Taser Intrusion Recovery
System. In: ACM SOSP. (2005)
68. Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious trans. IEEE Trans.
on Knowledge and Data Engineering 15 (5) (2002) 1167-1185
69. Yu, M., Liu, P., Zang, W.: “Self Healing Workflow Systems under Attacks”. In:
24th IEEE Int'l Conf. on Distributed Computing Systems. (2004)
70. Lomet, D., Vagena, Z., Barga, R.: Recovery from Bad User Transactions. In:
ACM SIGMOD. (2006)
71. Panda, B., Giordano, J.: Reconstructing the database after electronic attacks.
In: the 12th IFIP 11.3 Working Conference on Database Security, Greece, Italy
(July 1998)
72. Liu, P., Jing, J., Luenam, P., Wang, Y., Li, L., Ingsriswang, S.: “The Design
and Implementation of a Self-Healing Database System”. J. of Intelligent Infor-
mation Systems (JIIS) 23 (3) (2004) 247-269
73. Pilania, D., Chiueh, T.: Design, Implementation, and Evaluation of an Intru-
sion Resilient Database System. In: Proc. International Conference on Data
Engineering. (2005)
74. Liu, P., Ammann, P., Jajodia, S.: Rewriting histories: Recovery from malicious
trans. Distributed and Parallel Databases 8 (1) (2000) 7-40
75. Liu, P., Jajodia, S.: Multi-phase damage confinement in database systems for
intrusion tolerance. In: 14th IEEE Computer Security Foundations Workshop,
Nova Scotia, Canada (June 2001)
76. Ammann, P., Jajodia, S., McCollum, C., Blaustein, B.: Surviving information
warfare attacks on databases. In: the IEEE Symposium on Security and Privacy,
Oakland, CA (May 1997) 164-174
77. Liu, P., Jajodia, S., McCollum, C.: Intrusion confinement by isolation in infor-
mation systems. J. of Computer Security 8 (4) (2000) 243-279
78. Liu, P., Wang, H., Li, L.: Real-time Data Attack Isolation for Commercial
Database Applications. Elsevier Journal of Network and Computer Applications
29 (4) (2006) 294-320
79. Trivedi, K.S.: “Probability and statistics with reliability, queuing and computer
science applications”. John Wiley and Sons (2002)
80. Wang, H., Liu, P.: Modeling and Evaluating the Survivability of an Intrusion
Tolerant Database System. In: Proc. ESORICS (European Symposium on Re-
search in Computer Security). (2006)
Search WWH ::




Custom Search