-
1
-
-
0030649084
-
-
Ammann P, Jajodia S, McCollum CD, Blaustein BT. Surviving information warfare attacks on databases. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, May 1997. p. 164-74.
-
Ammann P, Jajodia S, McCollum CD, Blaustein BT. Surviving information warfare attacks on databases. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, May 1997. p. 164-74.
-
-
-
-
3
-
-
0035750945
-
-
Atluri V, Chun SA, Mazzoleni P. A Chinese wall security model for decentralized workflow systems. In: Proceedings of the 8th ACM conference on computer and communications security. New York: ACM Press; 2001. p. 48-57.
-
Atluri V, Chun SA, Mazzoleni P. A Chinese wall security model for decentralized workflow systems. In: Proceedings of the 8th ACM conference on computer and communications security. New York: ACM Press; 2001. p. 48-57.
-
-
-
-
4
-
-
55949109860
-
-
Barbara D, Goel R, Jajodia S. Using checksums to detect data corruption. In: Proceedings of the 2000 international conference on extending data base technology, March 2000.
-
Barbara D, Goel R, Jajodia S. Using checksums to detect data corruption. In: Proceedings of the 2000 international conference on extending data base technology, March 2000.
-
-
-
-
5
-
-
0030647982
-
-
Chen Q, Dayal U. Failure handling for transaction hierarchies. In: Gray A, Larson P, editors. Proceedings of the 13th international conference on data engineering. Birmingham, UK: IEEE Computer Society; April 7-11, 1997. p. 245-54.
-
Chen Q, Dayal U. Failure handling for transaction hierarchies. In: Gray A, Larson P, editors. Proceedings of the 13th international conference on data engineering. Birmingham, UK: IEEE Computer Society; April 7-11, 1997. p. 245-54.
-
-
-
-
6
-
-
21644459044
-
-
Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: Annual computer security applications conference, 2004. p. 179-88.
-
Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: Annual computer security applications conference, 2004. p. 179-88.
-
-
-
-
7
-
-
28444455187
-
-
Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: International conference on data engineering, 2005. p. 1024-35.
-
Chiueh T, Pilania D. Design, implementation, and evaluation of a repairable database management system. In: International conference on data engineering, 2005. p. 1024-35.
-
-
-
-
8
-
-
0023294428
-
An intrusion-detection model
-
Denning D.E. An intrusion-detection model. IEEE Trans Software Eng SE-13 (1987) 222-232
-
(1987)
IEEE Trans Software Eng
, vol.SE-13
, pp. 222-232
-
-
Denning, D.E.1
-
9
-
-
84992012238
-
-
Eder J, Liebhart W. Workflow recovery. In: Conference on cooperative information systems, 1996. p. 124-34.
-
Eder J, Liebhart W. Workflow recovery. In: Conference on cooperative information systems, 1996. p. 124-34.
-
-
-
-
10
-
-
0042078549
-
A survey of rollback-recovery protocols in message-passing systems
-
(Mootaz) Elnozahy E.N., Alvisi L., Wang Y.m., and Johnson D.B. A survey of rollback-recovery protocols in message-passing systems. ACM Comput Surveys 34 3 (2002) 375-408
-
(2002)
ACM Comput Surveys
, vol.34
, Issue.3
, pp. 375-408
-
-
(Mootaz) Elnozahy, E.N.1
Alvisi, L.2
Wang, Y.m.3
Johnson, D.B.4
-
11
-
-
84964528983
-
-
Ganger GR, Khosla PK, Bakkaloglu M, Bigrigg MW, Goodson GR, Oguz S, et al. Survivable storage systems. In: DARPA information survivability conference and exposition, vol. 2. Anaheim, CA: IEEE; June 12-14, 2001. p. 184-95.
-
Ganger GR, Khosla PK, Bakkaloglu M, Bigrigg MW, Goodson GR, Oguz S, et al. Survivable storage systems. In: DARPA information survivability conference and exposition, vol. 2. Anaheim, CA: IEEE; June 12-14, 2001. p. 184-95.
-
-
-
-
12
-
-
55949132526
-
-
Graubart R, Schlipper L, McCollum C. Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation; 1996.
-
Graubart R, Schlipper L, McCollum C. Defending database management systems against information warfare attacks. Technical report, The MITRE Corporation; 1996.
-
-
-
-
13
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Helman P., and Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Trans Software Eng 19 9 (1993) 886-901
-
(1993)
IEEE Trans Software Eng
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
14
-
-
55949089603
-
-
Jagannathan R, Lunt T. System design document: next generation intrusion detection expert system (nides). Technical report, SRI International, Menlo Park, CA; 1993.
-
Jagannathan R, Lunt T. System design document: next generation intrusion detection expert system (nides). Technical report, SRI International, Menlo Park, CA; 1993.
-
-
-
-
16
-
-
84962309834
-
-
Knight J, Sullivan K, Elder M, Wang C. Survivability architectures: issues and approaches. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 157-71.
-
Knight J, Sullivan K, Elder M, Wang C. Survivability architectures: issues and approaches. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 157-71.
-
-
-
-
17
-
-
0032218214
-
-
Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, CA, November 1998.
-
Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the 5th ACM conference on computer and communications security, San Francisco, CA, November 1998.
-
-
-
-
18
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W., and Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Security 3 4 (2000) 227-261
-
(2000)
ACM Trans Inf Syst Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
19
-
-
84940104123
-
-
Lee W, Stolfo S, Mok K. A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE symposium on security and privacy, Oakland, CA, May 1999.
-
Lee W, Stolfo S, Mok K. A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE symposium on security and privacy, Oakland, CA, May 1999.
-
-
-
-
20
-
-
0031175735
-
A survey of distributed database checkpointing
-
Lin J.-L., and Dunham M.H. A survey of distributed database checkpointing. Distrib Parallel Databases 5 3 (1997) 289-319
-
(1997)
Distrib Parallel Databases
, vol.5
, Issue.3
, pp. 289-319
-
-
Lin, J.-L.1
Dunham, M.H.2
-
21
-
-
0035689145
-
A low-cost checkpointing technique for distributed databases
-
Lin J.-L., and Dunham M.H. A low-cost checkpointing technique for distributed databases. Distrib Parallel Databases 10 3 (2001) 241-268
-
(2001)
Distrib Parallel Databases
, vol.10
, Issue.3
, pp. 241-268
-
-
Lin, J.-L.1
Dunham, M.H.2
-
23
-
-
82955176200
-
-
Liu P. Dais: a real-time data attack isolation system for commercial database applications. In: Proceedings of the 17th annual computer security applications conference, 2001.
-
Liu P. Dais: a real-time data attack isolation system for commercial database applications. In: Proceedings of the 17th annual computer security applications conference, 2001.
-
-
-
-
24
-
-
0034829988
-
-
Liu P, Jajodia S. Multi-phase damage confinement in database systems for intrusion tolerance. In: Proceedings of the 14th IEEE computer security foundations workshop, Nova Scotia, Canada, June 2001.
-
Liu P, Jajodia S. Multi-phase damage confinement in database systems for intrusion tolerance. In: Proceedings of the 14th IEEE computer security foundations workshop, Nova Scotia, Canada, June 2001.
-
-
-
-
25
-
-
55949119756
-
-
Liu P, Wang Y. The design and implementation of a multiphase database damage confinement system. In: Proceedings of the 2002 IFIP WG 11.3 working conference on data and application security, 2002.
-
Liu P, Wang Y. The design and implementation of a multiphase database damage confinement system. In: Proceedings of the 2002 IFIP WG 11.3 working conference on data and application security, 2002.
-
-
-
-
26
-
-
0033871806
-
Rewriting histories: recovery from malicious transactions
-
Liu P., Ammann P., and Jajodia S. Rewriting histories: recovery from malicious transactions. Distrib Parallel Databases 8 1 (2000) 7-40
-
(2000)
Distrib Parallel Databases
, vol.8
, Issue.1
, pp. 7-40
-
-
Liu, P.1
Ammann, P.2
Jajodia, S.3
-
27
-
-
0034513874
-
Intrusion confinement by isolation in information systems
-
Liu P., Jajodia S., and McCollum C.D. Intrusion confinement by isolation in information systems. J Comput Security 8 4 (2000) 243-279
-
(2000)
J Comput Security
, vol.8
, Issue.4
, pp. 243-279
-
-
Liu, P.1
Jajodia, S.2
McCollum, C.D.3
-
28
-
-
55949116584
-
-
Luenam P, Liu P. Odar: an on-the-fly damage assessment and repair system for commercial database applications. In: Proceedings of the 2001 IFIP WG 11.3 working conference on database and application security, 2001.
-
Luenam P, Liu P. Odar: an on-the-fly damage assessment and repair system for commercial database applications. In: Proceedings of the 2001 IFIP WG 11.3 working conference on database and application security, 2001.
-
-
-
-
29
-
-
55949094230
-
-
Luenam P, Liu P. The design of an adaptive intrusion tolerant database system. In: Proceedings of the IEEE workshop on intrusion tolerant systems, 2002.
-
Luenam P, Liu P. The design of an adaptive intrusion tolerant database system. In: Proceedings of the IEEE workshop on intrusion tolerant systems, 2002.
-
-
-
-
30
-
-
55949125814
-
-
Lunt T, McCollum C. Intrusion detection and response research at DARPA. Technical report, The MITRE Corporation, McLean, VA; 1998.
-
Lunt T, McCollum C. Intrusion detection and response research at DARPA. Technical report, The MITRE Corporation, McLean, VA; 1998.
-
-
-
-
31
-
-
55949088669
-
-
Lunt T, Tamaru A, Gilham F, Jagannathan R, Jalali C, Javitz HS, et al. A real time intrusion detection expert system (IDES). Technical report, SRI International, Menlo Park, CA; 1992.
-
Lunt T, Tamaru A, Gilham F, Jagannathan R, Jalali C, Javitz HS, et al. A real time intrusion detection expert system (IDES). Technical report, SRI International, Menlo Park, CA; 1992.
-
-
-
-
32
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt T.F. A survey of intrusion detection techniques. Comput Security 12 4 (1993) 405-418
-
(1993)
Comput Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
33
-
-
0029718782
-
-
McDermott J, Goldschlag D. Towards a model of storage jamming. In: Proceedings of the IEEE computer security foundations workshop, Kenmare, Ireland, June 1996. p. 176-85.
-
McDermott J, Goldschlag D. Towards a model of storage jamming. In: Proceedings of the IEEE computer security foundations workshop, Kenmare, Ireland, June 1996. p. 176-85.
-
-
-
-
34
-
-
84961726931
-
-
Medhi D, Tipper D. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 173-86.
-
Medhi D, Tipper D. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview. In: Proceedings of the 2000 DARPA information survivability conference and exposition, CA, June 2000. p. 173-86.
-
-
-
-
36
-
-
0036037097
-
-
Panda B, Haque KA. Extended data dependency approach: a robust way of rebuilding database. In: SAC '02: proceedings of the 2002 ACM symposium on applied computing. New York, NY, USA: ACM Press; 2002. p. 446-52.
-
Panda B, Haque KA. Extended data dependency approach: a robust way of rebuilding database. In: SAC '02: proceedings of the 2002 ACM symposium on applied computing. New York, NY, USA: ACM Press; 2002. p. 446-52.
-
-
-
-
37
-
-
84964546164
-
-
Stavridou V. Intrusion tolerant software architectures. In: Proceedings of the 2001 DARPA information survivability conference and exposition, CA, June 2001.
-
Stavridou V. Intrusion tolerant software architectures. In: Proceedings of the 2001 DARPA information survivability conference and exposition, CA, June 2001.
-
-
-
-
38
-
-
84978374045
-
-
Strunk JD, Goodson GR, Scheinholtz ML, Soules CAN, Ganger GR. Self-securing storage: protecting data in compromised systems. In: Operating systems design and implementation. USENIX Association: San Diego, CA; October 23-25, 2000. p. 165-80.
-
Strunk JD, Goodson GR, Scheinholtz ML, Soules CAN, Ganger GR. Self-securing storage: protecting data in compromised systems. In: Operating systems design and implementation. USENIX Association: San Diego, CA; October 23-25, 2000. p. 165-80.
-
-
-
-
39
-
-
21944450970
-
-
Tang J, Hwang S-Y. A scheme to specify and implement ad-hoc recovery in workflow systems. Lecture notes in computer science, vol. 1377. Berlin: Springer; 1998. p. 484-98.
-
Tang J, Hwang S-Y. A scheme to specify and implement ad-hoc recovery in workflow systems. Lecture notes in computer science, vol. 1377. Berlin: Springer; 1998. p. 484-98.
-
-
-
-
40
-
-
55949117741
-
-
Workflow Management Coalition Workflow Standard. Process definition interface-xml process definition language, 2005 〈http://www.wfmc.org/standards/docs/TC-1025_xpdl_2_2005-10-03.pdf〉.
-
Workflow Management Coalition Workflow Standard. Process definition interface-xml process definition language, 2005 〈http://www.wfmc.org/standards/docs/TC-1025_xpdl_2_2005-10-03.pdf〉.
-
-
-
-
41
-
-
0342410321
-
Survivable information storage systems
-
Wylie J.J., Bigrigg M.W., Strunk J.D., Ganger G.R., Kiliccote H., and Khosla P.K. Survivable information storage systems. IEEE Comput 33 8 (2000) 61-68
-
(2000)
IEEE Comput
, vol.33
, Issue.8
, pp. 61-68
-
-
Wylie, J.J.1
Bigrigg, M.W.2
Strunk, J.D.3
Ganger, G.R.4
Kiliccote, H.5
Khosla, P.K.6
-
42
-
-
55949093649
-
-
Wylie JJ, Bakkaloglu M, Pandurangan V, Bigrigg MW, Oguz S, Tew K, et al. Selecting the right data distribution scheme for a survivable storage system. Technical Report CMU-CS-01-120, Carnegie Mellon University; 2001.
-
Wylie JJ, Bakkaloglu M, Pandurangan V, Bigrigg MW, Oguz S, Tew K, et al. Selecting the right data distribution scheme for a survivable storage system. Technical Report CMU-CS-01-120, Carnegie Mellon University; 2001.
-
-
-
-
43
-
-
84944718313
-
-
Yu M, Liu P, Zang W. Multi-version based attack recovery of workflow. In: The 19th annual computer security applications conference, December 2003. p. 142-51.
-
Yu M, Liu P, Zang W. Multi-version based attack recovery of workflow. In: The 19th annual computer security applications conference, December 2003. p. 142-51.
-
-
-
-
44
-
-
2442492179
-
-
Yu M, Liu P, Zang W. Self-healing workflow systems under attacks. In: The 24th international conference on distributed computing systems (ICDCS'04), 2004. p. 418-25.
-
Yu M, Liu P, Zang W. Self-healing workflow systems under attacks. In: The 24th international conference on distributed computing systems (ICDCS'04), 2004. p. 418-25.
-
-
-
-
45
-
-
35048875281
-
-
Zhou J, Panda B, Hu Y. Succinct and fast accessible data structures for database damage assessment. In: Distributed computing and internet technology, 2004. p. 420-9.
-
Zhou J, Panda B, Hu Y. Succinct and fast accessible data structures for database damage assessment. In: Distributed computing and internet technology, 2004. p. 420-9.
-
-
-
-
46
-
-
75549088530
-
-
Zuo Y, Panda B. Damage discovery in distributed database systems. In: Database security, 2004. p. 111-23.
-
Zuo Y, Panda B. Damage discovery in distributed database systems. In: Database security, 2004. p. 111-23.
-
-
-
|