Damage assessment and recovery in a distributed database system in a post information attack detection scenario is a complicated process due to the indirect dependencies among (sub) transactions that are executed in various sites. Particularly, damage assessment in such a system requires collaborations among multiple participant sites as a result of distributed transactions. In this paper, we discuss two primary models, namely, centralized and peer-to-peer, to conduct damage assessment after an intrusion on a distributed database system is reported. For the centralized model, three different options have been presented. Advantages and disadvantages of each model are discussed. © 2004 Springer Science + Business Media, Inc.
CITATION STYLE
Zuo, Y., & Panda, B. (2004). Damage discovery in distributed database systems. In IFIP Advances in Information and Communication Technology (Vol. 144, pp. 111–123). Springer New York LLC. https://doi.org/10.1007/1-4020-8128-6_8
Mendeley helps you to discover research relevant for your work.