Recovery of data integrity under multi-tier architectures

M. Yu, W. Zang, P. Liu

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Recovery from attacks has been extensively studied at the database transaction level and the application level in recent years. To recover compromised database transactions, compensating and redoing the compromised database transactions need to be conducted under the concurrency control restrictions. Under a multi-tier service architecture, at the application level, attack recovery has more restrictions introduced by either control dependencies among application activities or application specifications. Thus, the multi-tier service architecture introduces more challenges to the attack recovery problem. In this study, the authors describe the recovery problems with a multi-layer dependency graph (MLDG). They also describe the techniques of damage assessment and recovery based on an MLDG.

Original languageEnglish (US)
Pages (from-to)344-351
Number of pages8
JournalIET Information Security
Volume4
Issue number4
DOIs
StatePublished - Dec 1 2010

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Recovery of data integrity under multi-tier architectures'. Together they form a unique fingerprint.

Cite this