Abstract
Recovery from attacks has been extensively studied at the database transaction level and the application level in recent years. To recover compromised database transactions, compensating and redoing the compromised database transactions need to be conducted under the concurrency control restrictions. Under a multi-tier service architecture, at the application level, attack recovery has more restrictions introduced by either control dependencies among application activities or application specifications. Thus, the multi-tier service architecture introduces more challenges to the attack recovery problem. In this study, the authors describe the recovery problems with a multi-layer dependency graph (MLDG). They also describe the techniques of damage assessment and recovery based on an MLDG.
Original language | English (US) |
---|---|
Pages (from-to) | 344-351 |
Number of pages | 8 |
Journal | IET Information Security |
Volume | 4 |
Issue number | 4 |
DOIs | |
State | Published - Dec 1 2010 |
All Science Journal Classification (ASJC) codes
- Software
- Information Systems
- Computer Networks and Communications