Trusted Recovery and Defensive Information Warfare

Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the inte...

Full description

Bibliographic Details
Main Authors: Peng Liu, Jajodia, Sushil (Author)
Format: eBook
Language:English
Published: New York, NY Springer US 2002, 2002
Edition:1st ed. 2002
Series:Advances in Information Security
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
Table of Contents:
  • 1. Introduction
  • 2. Background and Traditional System Recovery
  • 3. Trusted Recovery Models
  • 4. Trusted Recovery by Syntactic Approaches
  • 5. Trusted Recovery by Rewriting Histories
  • 6. Trusted Recovery in Distributed Systems
  • 7. Conclusion