Trusted Recovery and Defensive Information Warfare

1. Introduction.- 2. Background and Traditional System Recovery.- 3. Trusted Recovery Models.- 4. Trusted Recovery by Syntactic Approaches.- 5. Trusted Recovery by Rewriting Histories.- 6. Trusted Recovery in Distributed Systems.- 7. Conclusion.

[1]  Marianne Winslett,et al.  Formal query languages for secure relational databases , 1994, TODS.

[2]  Robert E. Strom,et al.  Optimistic recovery in distributed systems , 1985, TOCS.

[3]  James P. Black,et al.  Principles of Data Structure Error Correction , 1982, IEEE Transactions on Computers.

[4]  Michael Stonebraker,et al.  The Design of XPRS , 1988, VLDB.

[5]  R. Sekar,et al.  A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[6]  Hans-Jörg Schek,et al.  Concepts and Applications of Multilevel Transactions and Open Nested Transactions , 1992, Database Transaction Models for Advanced Applications.

[7]  E. B. Moss,et al.  Nested Transactions: An Approach to Reliable Distributed Computing , 1985 .

[8]  Shiuh-Pyng Shieh,et al.  On a Pattern-Oriented Model for Intrusion Detection , 1997, IEEE Trans. Knowl. Data Eng..

[9]  Jeffrey D. Uuman Principles of database and knowledge- base systems , 1989 .

[10]  Andreas Reuter,et al.  The ConTract Model , 1991, Database Transaction Models for Advanced Applications.

[11]  Richard A. Kemmerer,et al.  Penetration state transition analysis: A rule-based intrusion detection approach , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[12]  Brian Randell,et al.  System structure for software fault tolerance , 1975, IEEE Transactions on Software Engineering.

[13]  Ravi S. Sandhu The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[14]  William E. Weihl Commutativity-based concurrency control for abstract data types , 1988 .

[15]  Salvatore J. Stolfo,et al.  Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results 1 , 1997 .

[16]  Fang Chen,et al.  The multilevel relational (MLR) data model , 1998, TSEC.

[17]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[18]  Panos K. Chrysanthis,et al.  Advances in concurrency control and transaction processing - executive briefing , 1996 .

[19]  Calton Pu,et al.  Split-Transactions for Open-Ended Activities , 1988, VLDB.

[20]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.