{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:28:22Z","timestamp":1742398102127,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2002.1176303","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T15:35:00Z","timestamp":1056641700000},"page":"311-320","source":"Crossref","is-referenced-by-count":3,"title":["Architectures for intrusion tolerant database systems"],"prefix":"10.1109","author":[{"family":"Peng Liu","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0055474","article-title":"Using a high-performance, programmable secure coprocessor","author":"smith","year":"1998","journal-title":"Proc International Conference on Financial Cryptography"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503293"},{"key":"ref33","article-title":"Open implementation toolkit for building survivable applications","author":"pal","year":"2000","journal-title":"Proc of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"ref30","first-page":"173","article-title":"Multi-layered network survivability - models, analysis, architecture, framework and implementation: An overview","author":"medhi","year":"2000","journal-title":"Proceedings 2000 DARPA Information Survivability Conference and Exposition"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290171"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/49.622919"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/103140.103144"},{"key":"ref10","article-title":"Model-based intrusion detection","author":"garvey","year":"1991","journal-title":"Proceedings of the 14th National Computer Security Conference"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932175"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932173"},{"key":"ref12","article-title":"Defending database management systems against information warfare attacks","author":"graubart","year":"1996","journal-title":"Technical Report"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/320473.320482"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/32.372146"},{"key":"ref15","article-title":"Aaid: An application aware transaction-level database intrusion detection system","author":"ingsriswang","year":"2001","journal-title":"Technical Report"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253364"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1991.130799"},{"key":"ref18","first-page":"157","article-title":"Survivability architectures: Issues and approaches","author":"knight","year":"2000","journal-title":"Proceedings 2000 DARPA Information Survivability Conference and Exposition"},{"key":"ref19","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"Proc 2001 IEEE Symposium on Security and Privacy"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932165"},{"journal-title":"Multilevel Secure Transaction Processing","year":"1999","author":"atluri","key":"ref4"},{"key":"ref27","article-title":"How to build a trusted database system on untrusted storage","author":"maheshwari","year":"2000","journal-title":"Proceedings of 4th Symposium on Operating System Design and Implementation"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601331"},{"key":"ref6","article-title":"Computer Crime: An Emerging Challenge for Law Enforcement","volume":"1","year":"1996","journal-title":"FBI Law Enforcement Bulletin"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1996.503703"},{"key":"ref5","article-title":"Using checksums to detect data corruption","author":"barbara","year":"2000","journal-title":"Proceedings of the 2000 International Conference on Extending Data Base Technology"},{"key":"ref8","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proc 7th USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35501-6_12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1033782"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1270.1499"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/195664.195675"},{"key":"ref20","article-title":"Dais: A real-time data attack isolation system for commercial database applications","author":"liu","year":"2001","journal-title":"Proceedings of the 17th Annual Computer Security Applications Conference"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932164"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35508-5_1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/2.863969"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930146"},{"key":"ref42","article-title":"Credit card fraud detection using meta-learning: Issues and initial results","author":"stolfo","year":"1997","journal-title":"Proc AAAI Workshop on AI Approaches to Fraud Detection and Risk Management"},{"key":"ref24","article-title":"Odar: An on-the-fly damage assessment and repair system for commercial database applications","author":"luenam","year":"2001","journal-title":"Proceedings of the 2001 IFIP WG 11 3 Working Conference on Database and Application Security"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/2.642814"},{"key":"ref23","article-title":"The design and implementation of a multiphase database damage confinement system","author":"liu","year":"2002","journal-title":"Proceedings of the 2002 IFIP WG 11 3 Working Conference on Data and Application Security"},{"key":"ref44","first-page":"45","article-title":"Behind the hack attack","author":"taylor","year":"2000","journal-title":"Time"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90029-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932178"},{"key":"ref25","article-title":"The design of an adaptive intrusion tolerant database system","author":"luenam","year":"2002","journal-title":"Proc IEEE Workshop on Intrusion Tolerant Systems"}],"event":{"name":"Eighteenth Annual Computer Security Applications Conference","acronym":"CSAC-02","location":"Las Vegas, NV, USA"},"container-title":["18th Annual Computer Security Applications Conference, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8386\/26404\/01176303.pdf?arnumber=1176303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,24]],"date-time":"2020-03-24T03:47:08Z","timestamp":1585021628000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/csac.2002.1176303","relation":{},"subject":[]}}