Author:
Haraty Ramzi A.,Sai Mohamed El
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Hardware and Architecture,Human-Computer Interaction,Information Systems,Software
Reference24 articles.
1. Ammann P, Jajodia S, Liu P (2002) Recovery from malicious transactions. IEEE Trans Knowl Data Eng 14:1167–1185
2. Bai K, Liu P (2009) A data damage tracking quarantine and recovery (DTQR) scheme for mission-critical database systems. In: Proceedings of the 12th international conference on extending database technology: advances in database technology (EDBT ’09), pp 720–731
3. Bernstein P, Hadzilacos V, Goodman N (1986) Concurrency control and recovery in database systems. Addison Wesley, London
4. Chakraborty A, Majumdar A, Sural S (2009) A column dependency based approach for static and dynamic recovery of databases from malicious transactions. Int J Inf Secur 9:51–67
5. Chalurkar S, Kakade S, Khochare N, Meshramm B (2011) Survey on SQL injection attacks and their countermeasures. IJC EM Int J Comput Eng Manag 14:2230–7893
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献