scholarly journals Controlling The False Alarm In An Intrusion Tolerant Database System Using Significance Degrees Of Data Objects

2014 ◽  
Vol 13 (03) ◽  
pp. 212-225
Author(s):  
Zeinab Falahizar ◽  
Mohsen Rohani ◽  
Alireza Falahizar
Author(s):  
YUN BAI ◽  
YAN ZHANG

In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.


2016 ◽  
Vol 32 (1) ◽  
pp. 47-60
Author(s):  
Nga Thúy Mai

Class fragmentation and allocation is an important technique to improve the performance of a distributed object oriented database system. The class fragmentation is to split a class into smaller pieces in distributed databases aims to reduce the access to unnecessary data, the allocation is to locate fragmented classes into the sites in the connected network properly to reduce the cost of data transmission. Classes in object databases include attributes describing the characteristics of the object, methods describing the behavior, and relationships with objects with other classes, including relations inheritance. With such characteristics, class fragmentation and allocation in the distributed object oriented database system is more complex than fragmentation technique and design of relational databases. Fragmentation techniques applied in the design of distributed object-oriented database today often do not use cost between the sites, fragments are allocated to the site after getting a fragmentation method of data objects. This paper proposes an algorithm of fragmentation and allocation simultaneously, including the cost of data communication between the sites used for fragmentation to reduce communication costs when processing and querying distributed data.


2012 ◽  
Vol 7 (5) ◽  
pp. 224-234 ◽  
Author(s):  
Z. Falahiazar ◽  
M. Rohani ◽  
L. Falahiazar ◽  
M. Teshnelab

Author(s):  
Hai Wang

This chapter introduces the survivability evaluation, especially on the corresponding evaluation criteria and modeling techniques. The content of this chapter includes an overview of the literature of computer system dependability or security evaluation techniques and their limitation. The concept of survivability and the techniques for modeling and evaluating survivability are introduced. In addition, the whole process of modeling and evaluating the survivability of an intrusion tolerant database system (ITDB) is shown as a case study. The discussion included in this chapter would facilitate the readers to understand the fundamental difference among reliability, availability, survivability, and related concepts. This chapter would also help information security professionals to learn the methods of measuring information security and survivability.


Sign in / Sign up

Export Citation Format

Share Document