Trusted recovery

被引:32
作者
Jajodia, S [1 ]
McCollum, CD
Ammann, P
机构
[1] Mitre Corp, Mclean, VA USA
[2] George Mason Univ, Dept Informat & Software Engn, Fairfax, VA 22030 USA
[3] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
D O I
10.1145/306549.306580
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense.
引用
收藏
页码:71 / 75
页数:5
相关论文
共 5 条
[1]   Surviving information warfare attacks on databases [J].
Ammann, P ;
Jajodia, S ;
McCollum, CD ;
Blaustein, BT .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :164-174
[2]  
AMMANN P, TODS, V22, P215
[3]  
Garca-Molina H., 1987, P 1987 ACM SIGMOD IN, V16, P249, DOI [DOI 10.1145/38713.38742, DOI 10.1145/38714.38742]
[4]  
Lee P. A., 1990, Fault Tolerance: Principles and Practice, V2nd
[5]  
Reuter A, 1993, T PROCESSING CONCEPT