Background and Traditional System Recovery

Recovery methods have been studied extensively by researchers in fault tolerance and database areas. After a comprehensive introduction of the limitations of traditional mechanisms in trusted recovery, this chapter first addresses traditional recovery methods in the area of fault tolerance, then addresses traditional recovery methods in the area of databases. Some background in the areas of computer security and information warfare is also addressed.