Attack aware integrity control in databases (invited abstract)

Research output: Contribution to journalConference article

Abstract

Traditional database integrity control is focused on handling integrity constraint violations caused by failures and operator mistakes. However, as there are more and more malicious attacks on database systems, the traditional integrity control concept becomes too narrow to handle data integrity degradation caused by malicious attacks. In this talk, we present a framework of attack-aware database integrity control, where the concept of attack-aware integrity is investigated, a set of new integrity control problems are identified and the corresponding solutions are explored.

Original languageEnglish (US)
JournalIFIP Advances in Information and Communication Technology
Volume193
StatePublished - Dec 1 2005
EventIFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems - Fairfax, Virginia, United States
Duration: Dec 1 2005Dec 2 2005

Fingerprint

Degradation
Attack
Data base
Integrity
Violations
Data integrity
Operator

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Cite this

@article{dd3d14edd82045d2b9a328e746622399,
title = "Attack aware integrity control in databases (invited abstract)",
abstract = "Traditional database integrity control is focused on handling integrity constraint violations caused by failures and operator mistakes. However, as there are more and more malicious attacks on database systems, the traditional integrity control concept becomes too narrow to handle data integrity degradation caused by malicious attacks. In this talk, we present a framework of attack-aware database integrity control, where the concept of attack-aware integrity is investigated, a set of new integrity control problems are identified and the corresponding solutions are explored.",
author = "Peng Liu",
year = "2005",
month = "12",
day = "1",
language = "English (US)",
volume = "193",
journal = "IFIP Advances in Information and Communication Technology",
issn = "1868-4238",
publisher = "Springer New York",

}

Attack aware integrity control in databases (invited abstract). / Liu, Peng.

In: IFIP Advances in Information and Communication Technology, Vol. 193, 01.12.2005.

Research output: Contribution to journalConference article

TY - JOUR

T1 - Attack aware integrity control in databases (invited abstract)

AU - Liu, Peng

PY - 2005/12/1

Y1 - 2005/12/1

N2 - Traditional database integrity control is focused on handling integrity constraint violations caused by failures and operator mistakes. However, as there are more and more malicious attacks on database systems, the traditional integrity control concept becomes too narrow to handle data integrity degradation caused by malicious attacks. In this talk, we present a framework of attack-aware database integrity control, where the concept of attack-aware integrity is investigated, a set of new integrity control problems are identified and the corresponding solutions are explored.

AB - Traditional database integrity control is focused on handling integrity constraint violations caused by failures and operator mistakes. However, as there are more and more malicious attacks on database systems, the traditional integrity control concept becomes too narrow to handle data integrity degradation caused by malicious attacks. In this talk, we present a framework of attack-aware database integrity control, where the concept of attack-aware integrity is investigated, a set of new integrity control problems are identified and the corresponding solutions are explored.

UR - http://www.scopus.com/inward/record.url?scp=84883242232&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883242232&partnerID=8YFLogxK

M3 - Conference article

AN - SCOPUS:84883242232

VL - 193

JO - IFIP Advances in Information and Communication Technology

JF - IFIP Advances in Information and Communication Technology

SN - 1868-4238

ER -