Security Workflow Model for Database Storage
Hui Yuan, Lei Zheng, Xiangli Peng
Available Online July 2016.
- https://doi.org/10.2991/iccia-17.2017.46How to use a DOI?
- recovery property, compensation, workflow.
- The security workflow is proposed according to the transactional workflow discussed in this paper. When it comes to the security workflow, it is necessary to consider the compensation of the attack. In this paper, the recovery properties is introduced in security database workflow: non-vital property, compensable property, retriable property, critical property and replaceable property. With these properties discussed, the paper deeply analyses the abnormal workflow and advises the division of the abnormality. Further, some recovery modes for transaction workflow and security workflow are proposed. Finally, the paper presents the recovery algorithm for database storage. In that algorithm, the paper considers the difference between the master and the slave. The process method of the master database and the slave database is also discussed.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Hui Yuan AU - Lei Zheng AU - Xiangli Peng PY - 2016/07 DA - 2016/07 TI - Security Workflow Model for Database Storage BT - Proceedings of the 2nd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2017) PB - Atlantis Press SP - 276 EP - 281 SN - 2352-538X UR - https://doi.org/10.2991/iccia-17.2017.46 DO - https://doi.org/10.2991/iccia-17.2017.46 ID - Yuan2016/07 ER -