Skip Navigation

Scout Archives

Home Projects Publications Archives About Sign Up or Log In

Architectures for Intrusion Tolerant Database Systems

The Cyber Security Group at Pennsylvania State University is developing database software that can detect "attacks by malicious transactions" and repair the database with no interruption. This research paper proposes five different schemes for implementing such a system, with each one building on the previous. Some of the main goals for the schemes are automatic damage repair, attack isolation to prevent multiple attacks of the same type, and damage containment during the repair process. One of the most active faculty members of the research group, Assistant Professor Peng Liu, is the author of this paper, which was presented at a conference in December 2002.
Archived Scout Publication URL
Data Type
Language
Date of Scout Publication
February 14th, 2003
Date Of Record Creation
April 8th, 2003 at 10:51am
Date Of Record Release
April 8th, 2003 at 10:51am
Resource URL Clicks
25

Internal

Cumulative Rating
0
Add Comment

Comments

(no comments available yet)