Recovery of data integrity under multi-tier architectures
暂无分享,去创建一个
[1] Peng Liu,et al. Self-healing workflow systems under attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[2] Abraham Silberschatz,et al. A Formal Approach to Recovery by Compensating Transactions , 1990, VLDB.
[3] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[4] Roger S. Barga,et al. Recovery from "bad" user transactions , 2006, SIGMOD Conference.
[5] Sushil Jajodia,et al. Recovery from Malicious Transactions , 2002, IEEE Trans. Knowl. Data Eng..
[6] Ying Wang,et al. The Design and Implementation of a Self-Healing Database System , 2004, Journal of Intelligent Information Systems.
[7] Sushil Jajodia,et al. Rewriting Histories: Recovering from Malicious Transactions , 2004, Distributed and Parallel Databases.
[8] Peng Liu,et al. The implementation and evaluation of a recovery system for workflows , 2009, J. Netw. Comput. Appl..
[9] Peng Liu,et al. TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time Overhead , 2008, ESORICS.
[10] Tzi-cker Chiueh,et al. Design, implementation, and evaluation of a repairable database management system , 2004, 20th Annual Computer Security Applications Conference.
[11] Brajendra Panda,et al. Reconstructing the Database after Electronic Attacks , 1998, DBSec.
[12] Gustavo Alonso,et al. Atomicity and isolation for transactional processes , 2002, TODS.
[13] T. Chiueh,et al. Design, Implementation, and Evaluation of a Repairable Database Management System , 2005, ICDE.