Proceedings of the 2nd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2017)

Security Workflow Model for Database Storage

Authors
Hui Yuan, Lei Zheng, Xiangli Peng
Corresponding Author
Hui Yuan
Available Online July 2016.
DOI
https://doi.org/10.2991/iccia-17.2017.46How to use a DOI?
Keywords
recovery property, compensation, workflow.
Abstract
The security workflow is proposed according to the transactional workflow discussed in this paper. When it comes to the security workflow, it is necessary to consider the compensation of the attack. In this paper, the recovery properties is introduced in security database workflow: non-vital property, compensable property, retriable property, critical property and replaceable property. With these properties discussed, the paper deeply analyses the abnormal workflow and advises the division of the abnormality. Further, some recovery modes for transaction workflow and security workflow are proposed. Finally, the paper presents the recovery algorithm for database storage. In that algorithm, the paper considers the difference between the master and the slave. The process method of the master database and the slave database is also discussed.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Cite this article

TY  - CONF
AU  - Hui Yuan
AU  - Lei Zheng
AU  - Xiangli Peng
PY  - 2016/07
DA  - 2016/07
TI  - Security Workflow Model for Database Storage
BT  - Proceedings of the 2nd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2017)
PB  - Atlantis Press
SP  - 276
EP  - 281
SN  - 2352-538X
UR  - https://doi.org/10.2991/iccia-17.2017.46
DO  - https://doi.org/10.2991/iccia-17.2017.46
ID  - Yuan2016/07
ER  -