Recovery from Malicious Transactions
暂无分享,去创建一个
Sushil Jajodia | Peng Liu | Paul Ammann | S. Jajodia | Peng Liu | P. Ammann
[1] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, CSUR.
[2] Mark R. Tuttle,et al. Redo Recovery after System Crashes , 1995, VLDB.
[3] Sushil Jajodia,et al. Using Checksums to Detect Data Corruption , 2000, EDBT.
[4] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[5] Gerhard Weikum,et al. Multi-level recovery , 1990, PODS.
[6] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[7] Andreas Reuter,et al. The ConTract Model , 1991, Database Transaction Models for Advanced Applications.
[8] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[9] Hector Garcia-Molina,et al. Using semantic knowledge for transaction processing in a distributed database , 1983, TODS.
[10] Abraham Silberschatz,et al. A Formal Approach to Recovery by Compensating Transactions , 1990, VLDB.
[11] Fang Chen,et al. The multilevel relational (MLR) data model , 1998, TSEC.
[12] Marianne Winslett,et al. Formal query languages for secure relational databases , 1994, TODS.
[13] E. B. Moss,et al. Nested Transactions: An Approach to Reliable Distributed Computing , 1985 .
[14] Hamid Pirahesh,et al. Efficient and flexible methods for transient versioning of records to avoid locking by read-only transactions , 1992, SIGMOD '92.
[15] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[16] A. Elmagarmid. Database transaction models for advanced applications , 1992 .
[17] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[18] Calton Pu,et al. Split-Transactions for Open-Ended Activities , 1988, VLDB.
[19] John P. McDermott,et al. Storage Jamming , 1995, DBSec.
[20] Sushil Jajodia,et al. On-The-Fly Reading of Entire Databases , 1995, IEEE Trans. Knowl. Data Eng..
[21] Sushil Jajodia,et al. Multilevel Secure Transaction Processing , 1999, Advances in Database Systems.
[22] Butler W. Lampson,et al. Atomic Transactions , 1980, Advanced Course: Distributed Systems.
[23] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[24] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[25] Hans-Jörg Schek,et al. Concepts and Applications of Multilevel Transactions and Open Nested Transactions , 1992, Database Transaction Models for Advanced Applications.
[26] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[27] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[28] Shiuh-Pyng Shieh,et al. On a Pattern-Oriented Model for Intrusion Detection , 1997, IEEE Trans. Knowl. Data Eng..
[29] David B. Lomet,et al. MLR: a recovery method for multi-level systems , 1992, SIGMOD '92.
[30] John P. McDermott,et al. Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[31] Jim Gray,et al. Benchmark Handbook: For Database and Transaction Processing Systems , 1992 .