{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T05:05:30Z","timestamp":1737090330460,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":63,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387276946"},{"type":"electronic","value":"9780387276960"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-27696-0_3","type":"book-chapter","created":{"date-parts":[[2007,5,11]],"date-time":"2007-05-11T03:03:01Z","timestamp":1178852581000},"page":"59-94","source":"Crossref","is-referenced-by-count":3,"title":["Trusted Recovery"],"prefix":"10.1007","author":[{"given":"Meng","family":"Yu","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wanyu","family":"Zang","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"M. R. Adam. Security-Control Methods for Statistical Database: A Comparative Study. ACM Computing Surveys, 21(4), 1989.","DOI":"10.1145\/76894.76895"},{"issue":"5","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TKDE.2002.1033782","volume":"14","author":"P. Ammann","year":"2002","unstructured":"P. Ammann, S. Jajodia, and P. Liu. Recovery from malicious transactions. IEEE Transaction on Knowledge and Data Engineering, 14(5):1167\u20131185, 2002.","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"P. Ammann, S. Jajodia, C.D. McCollum, and B.T. Blaustein. Surviving information warfare attacks on databases. In Proceedings of the IEEE Symposium on Security and Privacy, pages 164\u2013174, Oakland, CA, May 1997.","DOI":"10.1109\/SECPRI.1997.601331"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"V. Atluri, S. Jajodia, and B. George. Multilevel Secure Transaction Processing. Kluwer Academic Publishers, 1999.","DOI":"10.1007\/978-1-4615-4553-8"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Vijayalakshmi Atluri, Soon Ae Chun, and Pietro Mazzoleni. A Chinese wall security model for decentralized workflow systems. In Proceedings of the 8th ACM conference on Computer and Communications Security, pages 48\u201357. ACM Press, 2001.","DOI":"10.1145\/501983.501991"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"D. Barbara, R. Goel, and S. Jajodia. Using checksums to detect data corruption. In Proceedings of the 2000 International Conference on Extending Data Base Technology, Mar 2000.","DOI":"10.1007\/3-540-46439-5_9"},{"issue":"1","key":"3_CR7","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/102810.102813","volume":"1","author":"Y. b. Lin","year":"1991","unstructured":"Yi bing Lin and Edward D. Lazowska. A study of time warp rollback machanisms. ACM Transactions on Modeling and Computer Simulations, 1(1):51\u201372, January 1991.","journal-title":"ACM Transactions on Modeling and Computer Simulations"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Qiming Chen and Umeshwar Dayal. Failure handling for transaction hierarchies. In Alex Gray and Per-RAke Larson, editors, Proceedings of the Thirteenth International Conference on Data Engineering, April 7\u201311, 1997 Birmingham U.K, pages 245\u2013254. IEEE Computer Society, 1997.","DOI":"10.1109\/ICDE.1997.581781"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Tzi cker Chiueh and Dhruv Pilania. Design, implementation, and evaluation of a repairable database management system. In International Conference on Data Engineering, pages 1024\u20131035, 2005.","DOI":"10.1109\/ICDE.2005.49"},{"key":"3_CR10","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D. E. Denning","year":"1987","unstructured":"D. E. Denning. An intrusion-detection model. IEEE Trans. on Software Engineering, SE-13:222\u2013232, February 1987.","journal-title":"IEEE Trans. on Software Engineering"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Johann Eder and Walter Liebhart. Workflow recovery. In Conference on Cooperative Information Systems, pages 124\u2013134, 1996.","DOI":"10.1109\/COOPIS.1996.555004"},{"issue":"3","key":"3_CR12","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/568522.568525","volume":"34","author":"E. N. Mootaz Elnozahy","year":"2002","unstructured":"E. N. (Mootaz) Elnozahy, Lorenzo Alvisi, Yi min Wang, and David B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys, 34(3):375\u2013408, September 2002.","journal-title":"ACM Computing Surveys"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/DISCEX.2001.932171","volume":"2","author":"G. R. Ganger","year":"2001","unstructured":"Gregory R. Ganger, Pradeep K. Khosla, Mehmet Bakkaloglu, Michael W. Bigrigg, Garth R. Goodson, Semih Oguz, Vijay Pandurangan, Craig A. N. Soules, John D. Strunk, and Jay J. Wylie. Survivable storage systems. In DARPA Information Survivability Conference and Exposition, volume 2, pages 184\u2013195, Anaheim, CA, 12\u201314 June 2001. IEEE.","journal-title":"DARPA Information Survivability Conference and Exposition"},{"key":"3_CR14","unstructured":"R. Graubart, L. Schlipper, and C. McCollum. Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation, 1996."},{"key":"3_CR15","unstructured":"J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques. Morgan Kaufmann Publishers, Inc., 1993."},{"issue":"3","key":"3_CR16","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/320473.320482","volume":"1","author":"P. P. Griffiths","year":"1976","unstructured":"P. P. Griffiths and B. W. Wade. An Authorization Mechanism for a Relational Database System. ACM Transactions on Database Systems, 1(3):242\u2013255, September 1976.","journal-title":"ACM Transactions on Database Systems"},{"issue":"9","key":"3_CR17","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1109\/32.241771","volume":"19","author":"P. Helman","year":"1993","unstructured":"P. Helman and G. Liepins. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering, 19(9):886\u2013901, 1993.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"3_CR18","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/32.372146","volume":"21","author":"K. Ilgun","year":"1995","unstructured":"K. Ilgun, R.A. Kemmerer, and P.A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3): 181\u2013199, 1995.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"3_CR19","volume-title":"System design document: Next generation intrusion detection expert system (nides)","author":"R. Jagannathan","year":"1993","unstructured":"R. Jagannathan and T. Lunt. System design document: Next generation intrusion detection expert system (nides). Technical report, SRI International, Menlo Park, California, 1993."},{"issue":"2","key":"3_CR20","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26(2):214\u2013260, 2001.","journal-title":"ACM Trans. Database Syst."},{"key":"3_CR21","unstructured":"H. S. Javitz and A. Valdes. The sri ides statistical anomaly detector. In Proceedings IEEE Computer Society Symposium on Security and Privacy, Oakland, CA, May 1991."},{"issue":"3","key":"3_CR22","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/3916.3988","volume":"7","author":"D. R. Jefferson","year":"1985","unstructured":"David R. Jefferson. Virtual time. ACM Transaction on Programming Languages and Systems, 7(3):404\u2013425, July 1985.","journal-title":"ACM Transaction on Programming Languages and Systems"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"J. Knight, K. Sullivan, M. Elder, and C. Wang. Survivability architectures: Issues and approaches. In Proceedings of the 2000 DARPA Information Survivability Conference & Exposition, pages 157\u2013171, CA, June 2000.","DOI":"10.21236\/ADA465737"},{"issue":"2","key":"3_CR24","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/566392.566395","volume":"12","author":"D. P. Kroese","year":"2002","unstructured":"Dirk P. Kroese and Victor F. Nicola. Efficient simulation of a tandem jackson network. ACM Transactions on Modeling and Computer Simulation, 12(2): 119\u2013141, April 2002.","journal-title":"ACM Transactions on Modeling and Computer Simulation"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"T. Lane and C.E. Brodley. Temporal sequence learning and data reduction for anomaly detection. In Proc. 5th ACM Conference on Computer and Communications Security, San Francisco, CA, Nov 1998.","DOI":"10.1145\/288090.288122"},{"key":"3_CR26","unstructured":"Wenke Lee, Sal Stolfo, and Kui Mok. A data mining framework for building intrusion detection models. In Proc. 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999."},{"issue":"4","key":"3_CR27","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/382912.382914","volume":"3","author":"W. Lee","year":"2000","unstructured":"Wenke Lee and Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3(4):227\u2013261, 2000.","journal-title":"ACM Transactions on Information and System Security"},{"issue":"3","key":"3_CR28","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1023\/A:1008689312900","volume":"5","author":"J.-L. Lin","year":"1997","unstructured":"Jun-Lin Lin and Margaret H. Dunham. A survey of distributed database checkpointing. Distributed and Parallel Databases, 5(3):289\u2013319, 1997.","journal-title":"Distributed and Parallel Databases"},{"issue":"3","key":"3_CR29","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1023\/A:1019265308523","volume":"10","author":"J.-L. Lin","year":"2001","unstructured":"Jun-Lin Lin and Margaret H. Dunham. A low-cost checkpointing technique for distributed databases. Distributed and Parallel Databases, 10(3):241\u2013268, 2001.","journal-title":"Distributed and Parallel Databases"},{"key":"3_CR30","unstructured":"P. Liu. Dais: A real-time data attack isolation system for commercial database applications. In Proceedings of the 17th Annual Computer Security Applications Conference, 2001."},{"issue":"1","key":"3_CR31","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008731200105","volume":"8","author":"P. Liu","year":"2000","unstructured":"P. Liu, P. Ammann, and S. Jajodia. Rewriting histories: Recovery from malicious transactions. Distributed and Parallel Databases, 8(1):7\u201340, 2000.","journal-title":"Distributed and Parallel Databases"},{"key":"3_CR32","unstructured":"P. Liu and S. Jajodia. Multi-phase damage confinement in database systems for intrusion tolerance. In Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001."},{"issue":"4","key":"3_CR33","doi-asserted-by":"crossref","first-page":"243","DOI":"10.3233\/JCS-2000-8402","volume":"8","author":"P. Liu","year":"2000","unstructured":"P. Liu, S. Jajodia, and CD. McCollum. Intrusion confinement by isolation in information systems. Journal of Computer Security, 8(4):243\u2013279, 2000.","journal-title":"Journal of Computer Security"},{"key":"3_CR34","unstructured":"P. Liu and Y. Wang. The design and implementation of a multiphase database damage confinement system. In Proceedings of the 2002 IFIP WG 11.3 Working Conference on Data and Application Security, 2002."},{"key":"3_CR35","unstructured":"P. Luenam and P. Liu. Odar: An on-the-fly damage assessment and repair system for commercial database applications. In Proceedings of the 2001 IFIP WG 11.3 Working Conference on Database and Application Security, 2001."},{"key":"3_CR36","unstructured":"P. Luenam and P. Liu. The design of an adaptive intrusion tolerant database system. In Proc. IEEE Workshop on Intrusion Tolerant Systems, 2002."},{"key":"3_CR37","volume-title":"A real time intrusion detection expert system (ides)","author":"T. Lunt","year":"1992","unstructured":"T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalali, H. S. Javitz, A. Valdes, P. G. Neumann, and T. D. Garvey. A real time intrusion detection expert system (ides). Technical report, SRI International, Menlo Park, California, 1992."},{"key":"3_CR38","volume-title":"Intrusion detection and response research at DARPA","author":"T. Lunt","year":"1998","unstructured":"Teresa Lunt and Catherine McCollum. Intrusion detection and response research at DARPA. Technical report, The MITRE Corporation, McLean, VA, 1998."},{"issue":"4","key":"3_CR39","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/0167-4048(93)90029-5","volume":"12","author":"T.F. Lunt","year":"1993","unstructured":"T.F. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12(4):405\u2013418, June 1993.","journal-title":"Computers & Security"},{"key":"3_CR40","unstructured":"N. Lynch, M. Merritt, W. Weihl, and A. Fekete. Atomic Transactions. Morgan Kaufmann, 1994."},{"key":"3_CR41","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/978-0-387-34932-9_23","volume-title":"Database Security IX: Status and Prospects","author":"J. McDermott","year":"1996","unstructured":"J. McDermott and D. Goldschlag. Storage jamming. In D.L. Spooner, S.A. Demurjian, and J.E. Dobson, editors, Database Security IX: Status and Prospects, pages 365\u2013381. Chapman & Hall, London, 1996."},{"key":"3_CR42","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/CSFW.1996.503703","volume-title":"Proceedings of the IEEE Computer Security Foundations Workshop","author":"J. McDermott","year":"1996","unstructured":"J. McDermott and D. Goldschlag. Towards a model of storage jamming. In Proceedings of the IEEE Computer Security Foundations Workshop, pages 176\u2013185, Kenmare, Ireland, June 1996."},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"D. Medhi and D. Tipper. Multi-layered network survivability \u2014 models, analysis, architecture, framework and implementation: An overview. In Proceedings of the 2000 DARPA Information Survivability Conference & Exposition, pages 173\u2013186, CA, June 2000.","DOI":"10.1109\/DISCEX.2000.824977"},{"key":"3_CR44","unstructured":"J. Eliot B. Moss. Nested Transactions: An Approach to Reliable Distributed Computing. The MIT Press, 1985."},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"B. Mukherjee, L. T. Heberlein, and K.N. Levitt. Network intrusion detection. IEEE Network, pages 26\u201341, June 1994.","DOI":"10.1109\/65.283931"},{"key":"3_CR46","unstructured":"Brajendra Panda and Kazi Asharful Haque. Extended data dependency approach: a robust way of rebuilding database. In SAC\u2019 02: Proceedings of the 2002 ACM symposium on Applied computing, pages 446\u2013452, New York, NY, USA, 2002. ACM Press."},{"key":"3_CR47","unstructured":"C. Pu, G. Kaiser, and N. Hutchinson. Split transactions for open-ended activities. In Proceedings of the International Conference on Very Large Databases, August 1988."},{"issue":"1","key":"3_CR48","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/103140.103144","volume":"16","author":"F. Rabitti","year":"1994","unstructured":"F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM Transactions on Database Systems, 16(1):88\u2013131, 1994.","journal-title":"ACM Transactions on Database Systems"},{"key":"3_CR49","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-2367-3","volume-title":"Performance and Reliability Analysis of Computer Systems","author":"R. A. Sahner","year":"1996","unstructured":"Robin A. Sahner, Kishor S. Trivedi, and Antonio Puliafito. Performance and Reliability Analysis of Computer Systems. Kluwer Academic Publishers, Norwell, Massachusetts, USA, 1996."},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"R. Sandhu and F. Chen. The multilevel relational (mlr) data model. ACM Transactions on Information and Systems Security, 1(1), 1998.","DOI":"10.1145\/290163.290171"},{"issue":"4","key":"3_CR51","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/69.617059","volume":"9","author":"S.-P. Shieh","year":"1997","unstructured":"S.-P. Shieh and V.D. Gligor. On a pattern-oriented model for intrusion detection. IEEE Transactions on Knowledge and Data Engineering, 9(4):661\u2013667, 1997.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"3_CR52","unstructured":"V. Stavridou. Intrusion tolerant software architectures. In Proceedings of the 2001 DARPA Information Survivability Conference & Exposition, CA, June 2001."},{"key":"3_CR53","unstructured":"John D. Strunk, Garth R. Goodson, Michael L. Scheinholtz, Craig A. N. Soules, and Gregory R. Ganger. Self-securing storage: Protecting data in compromised systems. In Operating Systems Design and Implementation, pages 165\u2013180, San Diego, CA, 23\u201325 October 2000. USENIX Association."},{"key":"3_CR54","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/BFb0101004","volume":"1377","author":"J. Tang","year":"1998","unstructured":"Jian Tang and San-Yih Hwang. A scheme to specify and implement ad-hoc recovery in workflow systems. Lecture Notes in Computer Science, 1377:484\u2013498, 1998.","journal-title":"Lecture Notes in Computer Science"},{"key":"3_CR55","series-title":"Wiley series in probability and mathematical statistics","volume-title":"Stochastic Models","author":"H. C. Tijms","year":"1994","unstructured":"Henk C. Tijms. Stochastic Models. Wiley series in probability and mathematical statistics. John Wiley & Son, New York, NY, USA, 1994."},{"issue":"4","key":"3_CR56","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1145\/195664.195675","volume":"19","author":"M. Winslett","year":"1994","unstructured":"M. Winslett, K. Smith, and X. Qian. Formal query languages for secure relational databases. ACM Transactions on Database Systems, 19(4):626\u2013662, 1994.","journal-title":"ACM Transactions on Database Systems"},{"key":"3_CR57","unstructured":"Jay J. Wylie, Mehmet Bakkaloglu, Vijay Pandurangan, Michael W. Bigrigg, Semih Oguz, Ken Tew, Cory Williams, Gregory R. Ganger, and Pradeep K. Khosla. Selecting the right data distribution scheme for a survivable storage system. Technical Report CMU-CS-01-120, Carnegie Mellon University, 2001."},{"issue":"8","key":"3_CR58","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/2.863969","volume":"33","author":"J. J. Wylie","year":"2000","unstructured":"Jay J. Wylie, Michael W. Bigrigg, John D. Strunk, Gregory R. Ganger, Han Kiliccote, and Pradeep K. Khosla. Survivable information storage systems. IEEE Computer, 33(8):61\u201368, August 2000.","journal-title":"IEEE Computer"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Meng Yu, Peng Liu, and Wanyu Zang. Intrusion masking for distributed atomic operations. In The 18th IFIP International Information Security Conference, pages 229\u2013240, Athens Chamber of Commerce and Industry, Greece, 26\u201328 May 2003. IFIP Technical Committee 11, Kluwer Academic Publishers.","DOI":"10.1007\/978-0-387-35691-4_20"},{"key":"3_CR60","doi-asserted-by":"crossref","unstructured":"Meng Yu, Peng Liu, and Wanyu Zang. Self-healing workflow systems under attacks. In The 24th International Conference on Distributed Computing Systems(ICDCS\u201904), pages 418\u2013425, 2004.","DOI":"10.1109\/ICDCS.2004.1281607"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Meng Yu, Peng Liu, and Wanyu Zang. Multi-version based attack recovery of workflow. In The 19th Annual Computer Security Applications Conference, pages 142\u2013151, Dec. 2003.","DOI":"10.1109\/CSAC.2003.1254319"},{"key":"3_CR62","doi-asserted-by":"crossref","unstructured":"Jing Zhou, Brajendra Panda, and Yi Hu. Succinct and fast accessible data structures for database damage assessment. In Distributed Computing and Internet Technology, pages 420\u2013429, 2004.","DOI":"10.1007\/978-3-540-30555-2_49"},{"key":"3_CR63","unstructured":"Yanjun Zuo and Brajendra Panda. Damage discovery in distributed database systems. In Database Security, pages 111\u2013123, 2004."}],"container-title":["Advances in Information Security","Secure Data Management in Decentralized Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-27696-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T04:17:15Z","timestamp":1737001035000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-27696-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387276946","9780387276960"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-27696-0_3","relation":{},"ISSN":["1568-2633"],"issn-type":[{"type":"print","value":"1568-2633"}],"subject":[],"published":{"date-parts":[[2007]]}}}