Maintaining Replicated Authorizations in Distributed Database Systems
暂无分享,去创建一个
[1] Hector Garcia-Molina,et al. Consistency in a partitioned network: a survey , 1985, CSUR.
[2] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[3] Maurice Herlihy,et al. Hybrid concurrency control for abstract data types , 1988, PODS '88.
[4] Ronald Fagin,et al. On an authorization mechanism , 1978, TODS.
[5] Robert E. Strom,et al. Optimistic recovery in distributed systems , 1985, TOCS.
[6] Liuba Shrira,et al. Providing high availability using lazy replication , 1992, TOCS.
[7] Michael J. Fischer,et al. Sacrificing serializability to attain high availability of data in an unreliable network , 1982, PODS.
[8] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[9] Tony P. Ng. Using histories to implement atomic objects , 1989, TOCS.
[10] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[11] Arthur J. Bernstein,et al. Efficient solutions to the replicated log and dictionary problems , 1984, PODC '84.
[12] Peter Buneman,et al. Semistructured data , 1997, PODS.
[13] Sushil Jajodia,et al. Dynamic voting algorithms for maintaining the consistency of a replicated database , 1990, TODS.