%0 Journal Article
%T Database Intrusion Containment and Recovery Techniques under Information Warfare
信息战条件下的数据库入侵限制和恢复技术
%A ZHONG Yong
%A QIN Xiao-Lin
%A
钟勇
%A 秦小麟
%J 计算机科学
%D 2005
%I
%X How can the databases survive information warfare attacks? The traditonal prevention-centric security is not enough. The techniques of prevention, deception and hiding, detection, containment and recovery are the impor- tant techniques for databases to survive information warfare attacks. Based on the situation the paper summaries the status of database containment and recovery techniques and the future research direction in this field is discussed.
%K Information warfare
%K Intrusion containment and recovery
%K Intrusion tolerance
%K Database security
恢复技术
%K 数据库
%K 信息战
%K 限制
%K 入侵
%K 可生存性
%K 安全机制
%K 预防技术
%K 隐藏技术
%K 检测技术
%K 生存技术
%K 研究重点
%K 欺骗
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=64A12D73428C8B8DBFB978D04DFEB3C1&aid=56C38EE712D9E7D2&yid=2DD7160C83D0ACED&vid=9971A5E270697F23&iid=DF92D298D3FF1E6E&sid=46CB27789995047D&eid=0D0D661F0B316AD5&journal_id=1002-137X&journal_name=计算机科学&referenced_num=0&reference_num=27