1. Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing 2(1), 2–19 (2005)
2. Ammann, P., Jajodia, S., McCollum, C.D., et al.: Surviving information warfare attacks on databases. In: IEEE Symposium on Security and Privacy, pp. 164–174. IEEE Press, New York (1997)
3. Jiping, Z., Xiaolin, Q., Yong, Z., et al.: SPN Model based Malicious Transaction Repair Algorithms in Survivable DBMS. Chinese Journal of Computer 29(8), 1480–1486 (2006)
4. Ammann, P., Jajodia, S., Liu, P.: Recovery From Malicious Transactions. Technical report, Dept. of Information and Software Engineering, George Mason University (1997)
5. Panda, B., Giordano, J.: Reconstructing the Database after Electronic Attacks. In: Database Security XII: Status and Prospect, pp. 143-156. Kluwer Academic Publishers (1999)