Sciweavers

71 search results - page 5 / 15
» Recovery from Malicious Transactions
Sort
View
COMPSAC
1997
IEEE
14 years 1 months ago
Building Software Recovery Assertions from a Fault Injection-based Propagation Analysis
We have investigated a fault injection-based technique for undermining the ability of software components to produce undesirable outputs into the state of the system. Undesirable ...
Jeffrey M. Voas
SIGMOD
2001
ACM
171views Database» more  SIGMOD 2001»
14 years 9 months ago
Fast-Start: Quick Fault Recovery in Oracle
Availability requirements for database systems are more stringent than ever before with the widespread use of databases as the foundation for ebusiness. This paper highlights Fast...
Tirthankar Lahiri, Amit Ganesh, Ron Weiss, Ashok J...
EUROSYS
2008
ACM
14 years 6 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
SIGMOD
2011
ACM
171views Database» more  SIGMOD 2011»
12 years 12 months ago
BRRL: a recovery library for main-memory applications in the cloud
In this demonstration we present BRRL, a library for making distributed main-memory applications fault tolerant. BRRL is optimized for cloud applications with frequent points of c...
Tuan Cao, Benjamin Sowell, Marcos Antonio Vaz Sall...
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 9 months ago
A Byzantine Fault Tolerant Distributed Commit Protocol
In this paper, we present a Byzantine fault tolerant distributed commit protocol for transactions running over untrusted networks. The traditional two-phase commit protocol is enh...
Wenbing Zhao