{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:54:49Z","timestamp":1760043289282},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_18","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T02:37:49Z","timestamp":1258079869000},"page":"237-251","source":"Crossref","is-referenced-by-count":5,"title":["A Robust Damage Assessment Model for Corrupted Database Systems"],"prefix":"10.1007","author":[{"given":"Ge","family":"Fu","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"18_CR1","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TKDE.2002.1033782","volume":"14","author":"P. Ammann","year":"2002","unstructured":"Ammann, P., Jajodia, S., Liu, P.: Recovery from malicious transactions. IEEE Trans. Knowl. Data Eng.\u00a014(5), 1167\u20131185 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"18_CR2","series-title":"IFIP Conference Proceedings","first-page":"239","volume-title":"DBSec","author":"P. Luenam","year":"2001","unstructured":"Luenam, P., Liu, P.: Odar: An on-the-fly damage assessment and repair system for commercial database applications. In: Olivier, M.S., Spooner, D.L. (eds.) DBSec. IFIP Conference Proceedings, vol.\u00a0215, pp. 239\u2013252. Kluwer, Dordrecht (2001)"},{"key":"18_CR3","first-page":"1024","volume-title":"ICDE","author":"T.-c. Chiueh","year":"2005","unstructured":"Chiueh, T.-c., Pilania, D.: Design, implementation, and evaluation of a repairable database management system. In: ICDE, pp. 1024\u20131035. IEEE Computer Society, Los Alamitos (2005)"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-540-88313-5_11","volume-title":"Computer Security - ESORICS 2008","author":"K. Bai","year":"2008","unstructured":"Bai, K., Yu, M., Liu, P.: Trace: Zero-down-time database damage tracking, quarantine, and cleansing with negligible run-time overhead. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 161\u2013176. Springer, Heidelberg (2008)"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1145\/1142473.1142512","volume-title":"SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data","author":"D. Lomet","year":"2006","unstructured":"Lomet, D., Vagena, Z., Barga, R.: Recovery from \u201dbad\u201d user transactions. In: SIGMOD 2006: Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp. 337\u2013346. ACM, New York (2006)"},{"key":"18_CR6","first-page":"1209","volume-title":"ICDE","author":"T. cker Chiueh","year":"2008","unstructured":"cker Chiueh, T., Bajpai, S.: Accurate and efficient inter-transaction dependency tracking. In: ICDE, pp. 1209\u20131218. IEEE, Los Alamitos (2008)"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Computer Security \u2013 ESORICS 2006","year":"2006","unstructured":"Gollmann, D., Meier, J., Sabelfeld, A. (eds.): ESORICS 2006. LNCS, vol.\u00a04189. Springer, Heidelberg (2006)"},{"key":"18_CR8","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1145\/508791.508875","volume-title":"SAC","author":"B. Panda","year":"2002","unstructured":"Panda, B., Haque, K.A.: Extended data dependency approach: a robust way of rebuilding database. In: SAC, pp. 446\u2013452. ACM, New York (2002)"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-0-387-27696-0_3","volume":"33","author":"M. Yu","year":"2007","unstructured":"Yu, M., Liu, P., Zang, W., Jajodia, S.: Trusted recovery. Secure Data Management in Decentralized Systems\u00a033, 59\u201394 (2007)","journal-title":"Secure Data Management in Decentralized Systems"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Luenam, P., Liu, P.: Odam: An on-the-fly damage assessment and repair system for commercial database applications, pp. 446\u2013452 (2003)","DOI":"10.1007\/978-0-387-35587-0_17"},{"key":"18_CR11","first-page":"97","volume-title":"ACSAC","author":"M. Yu","year":"2007","unstructured":"Yu, M., Zang, W., Liu, P.: Database isolation and filtering against data corruption attacks. In: ACSAC, pp. 97\u2013106. IEEE Computer Society, Los Alamitos (2007)"},{"issue":"1","key":"18_CR12","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.jnca.2008.03.007","volume":"32","author":"M. Yu","year":"2009","unstructured":"Yu, M., Liu, P., Zang, W.: The implementation and evaluation of a recovery system for workflows. J. Network and Computer Applications\u00a032(1), 158\u2013183 (2009)","journal-title":"J. Network and Computer Applications"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1145\/1451940.1451975","volume-title":"IDEAS 2008: Proceedings of the 2008 international symposium on Database engineering & applications","author":"H. Zhu","year":"2008","unstructured":"Zhu, H., Fu, G., Zhu, Y., Jin, R., L\u00fc, K., Shi, J.: Dynamic data recovery for database systems based on fine grained transaction log. In: IDEAS 2008: Proceedings of the 2008 international symposium on Database engineering & applications, pp. 249\u2013253. ACM, New York (2008)"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/FCST.2008.25","volume-title":"FCST 2008: Proceedings of the 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, Washington, DC, USA","author":"M. Xie","year":"2008","unstructured":"Xie, M., Zhu, H., Feng, Y., Hu, G.: Tracking and repairing damaged databases using before image table. In: FCST 2008: Proceedings of the 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, Washington, DC, USA, pp. 36\u201341. IEEE Computer Society, Los Alamitos (2008)"},{"key":"18_CR15","volume-title":"Database Systems: the Complete Book","author":"H. Garcia-Molina","year":"2001","unstructured":"Garcia-Molina, H., Ullman, J.D., Widom, J.D.: Database Systems: the Complete Book, 5th edn. Prentice Hall, Englewood Cliffs (2001)","edition":"5"},{"key":"18_CR16","first-page":"119","volume-title":"ACSAC","author":"A. Fayad","year":"1999","unstructured":"Fayad, A., Jajodia, S., McCollum, C.D.: Application-level isolation using data inconsistency detection. In: ACSAC, pp. 119\u2013126. IEEE Computer Society, Los Alamitos (1999)"},{"key":"18_CR17","unstructured":"Dameng: http:\/\/www.dameng.com\/"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,27]],"date-time":"2023-05-27T10:35:36Z","timestamp":1685183736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}