Architectures for intrusion tolerant database systems

  • Liu P
  • 22


    Mendeley users who have this article in their library.
  • 51


    Citations of this article.


In this paper, we propose four architectures for intrusion tolerant
database systems. While traditional secure database systems rely
on prevention controls, an intrusion tolerant database system can
operate through attacks in such a way that the system can continue
delivering essential services in face of attacks. Architecture I
can detect intrusions, and locate and repair the damage caused by
the intrusions. Architecture II enhances Architecture I with the
ability to isolate attacks so that the database can be immunized
from the damage caused by a lot of attacks. Architecture III enhances
Architecture I with the ability to dynamically contain the damage
in such a way that no damage will leak out during the attack recovery
process. Architecture IV enhances Architectures II and III with the
ability to adapt the intrusion tolerance control to the changing
environment so that a stabilized level of trustworthiness can be

Author-supplied keywords

  • Application software
  • Computer networks
  • Computer vision
  • Database systems
  • Face detection
  • Hardware
  • Operating systems
  • Pervasive computing
  • Security
  • Transaction databases

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Peng Liu

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free