Replication Does Survive Information Warfare Attacks

Recent literature on information warfare has suggested that general replication is not useful in dealing with storage jamming attacks. We show that special cases of replication are useful not only in detecting but also in recovering from storage jamming attacks.

[1]  John P. McDermott,et al.  Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[2]  J. Froscher,et al.  Practical Defenses Against Storage Jamming , 1997 .

[3]  Sushil Jajodia,et al.  Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[4]  John P. McDermott,et al.  Storage Jamming , 1995, DBSec.

[5]  John McDermott A Technique for Removing an Important Class of Trojan Horses from High-Order Languages , 1988 .

[6]  Ravi S. Sandhu,et al.  Separation of Duties in Computerized Information Systems , 1990, DBSec.