Reorganization of Database Log for Information Warfare Data Recovery
暂无分享,去创建一个
[1] Irving L. Traiger,et al. The notions of consistency and predicate locks in a database system , 1976, CACM.
[2] Hamid Pirahesh,et al. ARIES: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging , 1998 .
[3] Patrick Valduriez,et al. Principles of Distributed Database Systems , 1990 .
[4] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[5] Brajendra Panda,et al. Defensive information warfare , 1999, CACM.
[6] Andreas Reuter,et al. Principles of transaction-oriented database recovery , 1983, CSUR.
[7] Sushil Jajodia,et al. Trusted recovery , 1999, CACM.
[8] Abraham Silberschatz,et al. Database System Concepts , 1980 .
[9] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[10] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[12] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.