Efficient Damage Assessment and Repair in Resilient Distributed Database Systems
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Multilevel Secure Transaction Processing , 1999, Advances in Database Systems.
[2] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[3] Bruce G. Lindsay,et al. Transaction management in the R* distributed database management system , 1986, TODS.
[4] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[5] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[6] Anita Borg,et al. A message system supporting fault tolerance , 1983, SOSP '83.
[7] Peng Liu,et al. ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications , 2001, DBSec.
[8] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[9] Lorenzo Alvisi,et al. Reasons for a pessimistic or optimistic message logging protocol in MPI uncoordinated failure, recovery , 2009, 2009 IEEE International Conference on Cluster Computing and Workshops.
[10] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[11] Sushil Jajodia,et al. Using Checksums to Detect Data Corruption , 2000, EDBT.
[12] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[13] Abraham Silberschatz,et al. A Formal Approach to Recovery by Compensating Transactions , 1990, VLDB.
[14] John P. McDermott,et al. Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[15] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..