Damage discovery in distributed database systems

8Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Damage assessment and recovery in a distributed database system in a post information attack detection scenario is a complicated process due to the indirect dependencies among (sub) transactions that are executed in various sites. Particularly, damage assessment in such a system requires collaborations among multiple participant sites as a result of distributed transactions. In this paper, we discuss two primary models, namely, centralized and peer-to-peer, to conduct damage assessment after an intrusion on a distributed database system is reported. For the centralized model, three different options have been presented. Advantages and disadvantages of each model are discussed. © 2004 Springer Science + Business Media, Inc.

Cite

CITATION STYLE

APA

Zuo, Y., & Panda, B. (2004). Damage discovery in distributed database systems. In IFIP Advances in Information and Communication Technology (Vol. 144, pp. 111–123). Springer New York LLC. https://doi.org/10.1007/1-4020-8128-6_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free