Trusted Recovery and Defensive Information Warfare
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the inte...
Main Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
New York, NY
Springer US
2002, 2002
|
Edition: | 1st ed. 2002 |
Series: | Advances in Information Security
|
Subjects: | |
Online Access: | |
Collection: | Springer Book Archives -2004 - Collection details see MPG.ReNa |
Table of Contents:
- 1. Introduction
- 2. Background and Traditional System Recovery
- 3. Trusted Recovery Models
- 4. Trusted Recovery by Syntactic Approaches
- 5. Trusted Recovery by Rewriting Histories
- 6. Trusted Recovery in Distributed Systems
- 7. Conclusion