Architectures for intrusion tolerant database systems