A robust damage assessment model for corrupted database systems
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are...
Saved in:
Main Authors: | FU, Ge, ZHU, Hong, LI, Yingjiu |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4177 https://ink.library.smu.edu.sg/context/sis_research/article/5180/viewcontent/a_robust_damage_assessment_model_for_corrupted_database_systems.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
A Robust Damage Assessment for Corrupted Database Systems Based on Inter-Transaction Dependencies
by: FU, Ge, et al.
Published: (2009) -
Automated Knowledge Extraction for Decision Model Construction: A Data Mining Approach.
by: Zhu A.,, et al.
Published: (2003) -
DyCuckoo: Dynamic hash tables on GPUs
by: LI, Yuchen, et al.
Published: (2021) -
Spatial and temporal image fusion via regularized spatial unmixing
by: XU, Yong, et al.
Published: (2015) -
Geometric approaches for Top-k Queries [Tutorial]
by: MOURATIDIS, Kyriakos
Published: (2017)