{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:44:02Z","timestamp":1743144242223,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540883128"},{"type":"electronic","value":"9783540883135"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88313-5_11","type":"book-chapter","created":{"date-parts":[[2008,10,4]],"date-time":"2008-10-04T04:41:44Z","timestamp":1223095304000},"page":"161-176","source":"Crossref","is-referenced-by-count":3,"title":["TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead"],"prefix":"10.1007","author":[{"given":"Kun","family":"Bai","sequence":"first","affiliation":[]},{"given":"Meng","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"11_CR1","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TKDE.2002.1033782","volume":"14","author":"P. Ammann","year":"2002","unstructured":"Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Transaction on Knowledge and Data Engineering\u00a014(5), 1167\u20131185 (2002)","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Ammann, P., Jajodia, S., McCollum, C., Blaustein, B.: Surviving information warfare attacks on databases. In: The IEEE Symposium on Security and Privacy, Oakland, CA, May 1997, pp. 164\u2013174 (1997)","DOI":"10.1109\/SECPRI.1997.601331"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Bai, K., Liu, P.: Towards database firewall: Mining the damage spreading patterns. In: 22 nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 449\u2013462 (2006)","DOI":"10.1109\/ACSAC.2006.52"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Barbara, D., Goel, R., Jajodia, S.: Using checksums to detect data corruption. In: Int\u2019l Conf. on Extending Data Base Technology (March 2000)","DOI":"10.1007\/3-540-46439-5_9"},{"key":"11_CR5","volume-title":"Concurrency control and recovery in database systems","author":"P.A. Bernstein","year":"1987","unstructured":"Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency control and recovery in database systems. Addison-Wesley Publishing Company, Reading (1987)"},{"key":"11_CR6","unstructured":"CERT. Cert advisory ca-2003-04 ms-sql server worm (January 25, 2003), http:\/\/www.cert.org\/advisories\/CA-2003-04.html"},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1109\/ICDE.1997.581781","volume-title":"Proceedings of the Thirteenth International Conference on Data Engineering","author":"Q. Chen","year":"1997","unstructured":"Chen, Q., Dayal, U.: Failure handling for transaction hierarchies. In: Gray, A., Larson, P.-\u00c5. (eds.) Proceedings of the Thirteenth International Conference on Data Engineering, Birmingham, U.K, April 7-11, 1997, pp. 245\u2013254. IEEE Computer Society, Los Alamitos (1997)"},{"key":"11_CR8","unstructured":"Chiueh, T., Pilania, D.: Design, implementation, and evaluation of an intrusion resilient database system. In: Proc. International Conference on Data Engineering, April 2005, pp. 1024\u20131035 (2005)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Eder, J., Liebhart, W.: Workflow recovery. In: Conference on Cooperative Information Systems, pp. 124\u2013134 (1996)","DOI":"10.1109\/COOPIS.1996.555004"},{"key":"11_CR10","unstructured":"TPC-C Benchmark, http:\/\/www.tpc.org\/tpcc\/"},{"key":"11_CR11","unstructured":"Lake, C.: Journal based recovery tool for ingres"},{"issue":"3","key":"11_CR12","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1023\/A:1008689312900","volume":"5","author":"J.-L. Lin","year":"1997","unstructured":"Lin, J.-L., Dunham, M.H.: A survey of distributed database checkpointing. Distributed and Parallel Databases\u00a05(3), 289\u2013319 (1997)","journal-title":"Distributed and Parallel Databases"},{"key":"11_CR13","unstructured":"Liu, P.: Architectures for intrusion tolerant database systems. In: The 18th Annual Computer Security Applications Conference, December 9-13, 2002, pp. 311\u2013320 (2002)"},{"issue":"1","key":"11_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008731200105","volume":"8","author":"P. Liu","year":"2000","unstructured":"Liu, P., Ammann, P., Jajodia, S.: Rewriting histories: Recovery from malicious transactions. Distributed and Parallel Databases\u00a08(1), 7\u201340 (2000)","journal-title":"Distributed and Parallel Databases"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1145\/1142473.1142512","volume-title":"SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data","author":"D. Lomet","year":"2006","unstructured":"Lomet, D., Vagena, Z., Barga, R.: Recovery from \u201dbad\u201d user transactions. In: SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 337\u2013346. ACM Press, New York (2006)"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"McDermott, J., Goldschlag, D.: Towards a model of storage jamming. In: The IEEE Computer Security Foundations Workshop, Kenmare, Ireland, June 1996, pp. 176\u2013185 (1996)","DOI":"10.1109\/CSFW.1996.503703"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/128765.128770","volume":"17","author":"C. Mohan","year":"1992","unstructured":"Mohan, C., Haderle, D., Lindsay, B., Pirahesh, H., Schwarz, P.: Aries: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. ACM Trans. Database Syst.\u00a017(1), 94\u2013162 (1992)","journal-title":"ACM Trans. Database Syst."},{"key":"11_CR18","unstructured":"ORACLE. Oracle database advanced application developer\u2019s guide (2007)"},{"key":"11_CR19","unstructured":"OWASP. Owasp top ten most critical web application security vulnerabilities (January 27, 2004), http:\/\/www.owasp.org\/documentation\/topten.html"},{"key":"11_CR20","unstructured":"Panda, B., Giordano, J.: Reconstructing the database after electronic attacks. In: The 12th IFIP 11.3 Working Conference on Database Security, Greece, Italy (July 1998)"},{"key":"11_CR21","unstructured":"Postgresql, http:\/\/www.postgresql.org\/"},{"key":"11_CR22","unstructured":"Sobhan, R., Panda, B.: Reorganization of the database log for information warfare data recovery. In: Proceedings of the fifteenth annual working conference on Database and application security, Niagara, Ontario, Canada, July 15-18, 2001, pp. 121\u2013134 (2001)"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1007\/BFb0101004","volume-title":"Advances in Database Technology - EDBT \u201998","author":"J. Tang","year":"1998","unstructured":"Tang, J., Hwang, S.-Y.: A scheme to specify and implement ad-hoc recovery in workflow systems. In: Schek, H.-J., Saltor, F., Ramos, I., Alonso, G. (eds.) EDBT 1998. LNCS, vol.\u00a01377, pp. 484\u2013498. Springer, Heidelberg (1998)"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1007\/11408079_77","volume-title":"Database Systems for Advanced Applications","author":"Q. Yao","year":"2005","unstructured":"Yao, Q., An, A., Huang, X.: Finding and analyzing database user sessions. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol.\u00a03453, pp. 851\u2013862. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88313-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T10:54:46Z","timestamp":1738407286000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88313-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540883128","9783540883135"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88313-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}