期刊文献+

基于SPN模型的可生存性DBMS中恶意事务修复算法的研究 被引量:11

SPN Model based Malicious Transaction Repair Algorithms in Survivable DBMS
下载PDF
导出
摘要 在传统的数据库恶意事务修复方案的基础上,采用Petri网模型分析事务撤销冲突和操作执行序列异常检测;进而结合可生存性DBMS特征提出恶意事务静态和on-the-fly修复算法,并在此基础上给出随机Petri网恶意事务修复模型;在分析恶意事务修复随机Petri网模型和连续时间Markov链的一致性后,给出了连续时间Markov链的恶意事务修复模型求解. Malicious transaction immediate repairing is an important aspect in building survivable DBMS. Based on traditional malicious transaction repairing solutions, this paper solves transaction undo collision and incorrect executing sequence of transaction operations using Petri net models. Considering characteristics of survivable DBMS, algorithms of static and on-the-fly malicious transaction repairing are provided. Further, related repairing system models are put up based on stochastic Petri net models. After consistency analysis of malicious transaction repairing stochastic Petri net model with continuous time Markov chain, this paper provides malicious transaction repairing solutions using continuous time Markov chain.
出处 《计算机学报》 EI CSCD 北大核心 2006年第8期1480-1486,共7页 Chinese Journal of Computers
基金 江苏省高技术研究计划项目基金(BG2004-005) 航空科学基金(02F52033)资助.
关键词 可生存性DBMS 随机PETRI网 连续时间Markov链 恶意事务修复算法 survivable DBMS stochastic Petri net continuous time Markov chain malicioustransaction repairing algorithms
  • 相关文献

参考文献18

  • 1Bertino E. , Sandhu R.. Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 2005, 2(1): 2-19
  • 2Ammann P. , Jajodia S. , McCollum C. D. , Blaustein B. T..Surviving information warfare attacks on databases. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, 1997, 164-174
  • 3Knight J. , Sullivan K. , Elder M. , Wang C.. Survivability architectures: Issues and approaches. In: Proceedings of the 2000 DARPA Information Survivability Conference & Exposition, Los Alamitos, California, 2000, 157-171
  • 4Madan B. B. , Trivedi K. S.. Security modeling and quantification of intrusion tolerant systems using attack-response graph.High Speed Networks, 2004, 13(4): 297-308
  • 5Bai K. , Wang H. , Liu P.. Towards database firewalls. In:Proceedings of the IFTP International Federation for Information, 2005, 178-192
  • 6Ammann P., Jajodia S., Liu P.. Recovery from malicioustrans actions. IEEE Transactions on Knowledge and Data Engineering, 2002, 14(5): 1167-1185
  • 7Murata T.. Petri nets: Properties, analysis, and applications.In: Proceedings of the IEEE, 1989, 77(4): 541-580
  • 8Zurawski R. , Zhou M. C.. Petri nets and industrial applications: A tutorial. IEEE Transactions on Industrial Electronics,1994, 41(6): 567-583
  • 9Panda B., Haque K. A., Extended data dependency approach:A robust way of rebuilding database. In: Proceedings of the 2002 ACM Symposium on Applied Computing, New York,2000, 446-452
  • 10Panda B. , Tripathy S.. Data dependency based logging for defensive information warfare. In: Proceedings of the 2000 ACM Symposium on Applied Computing, New York, 2000, 361365

同被引文献119

引证文献11

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部