Dynamic data recovery for database systems based on fine grained transaction log
暂无分享,去创建一个
[1] Uffe Kock Wiil,et al. Proceedings of the 1998 ACM Symposium on Applied Computing, SAC'98, February, Atlanta, GA , 1998 .
[2] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[3] Brajendra Panda,et al. Transaction Fusion: A Model for Data Recovery from Information Attacks , 2004, Journal of Intelligent Information Systems.
[4] Peng Liu,et al. Self-healing workflow systems under attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[5] Peng Liu,et al. Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System , 2006, ESORICS.
[6] Peng Liu,et al. ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications , 2001, DBSec.
[7] Brajendra Panda,et al. An overview of post information warfare data recovery , 1998, SAC '98.
[8] Peng Liu. Architectures for intrusion tolerant database systems , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[9] Sushil Jajodia,et al. Rewriting Histories: Recovering from Malicious Transactions , 2004, Distributed and Parallel Databases.
[10] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of a repairable database management system , 2004, 20th Annual Computer Security Applications Conference.