Author:
Rao Udai Pratap,Patel Dhiren R.
Subject
Information Systems and Management,Computer Science Applications,Software
Reference20 articles.
1. Recovery from malicious transactions
2. Detection and recovery techniques for database corruption
3. A column dependency-based approach for static and dynamic recovery of databases from malicious transactions
4. Chakraborty, A., Garg, M. K., Majumdar, A. K. and Sural, S. 2006.Online recovery of a distributed database from malicious attack, 313–314. Tenth International Database Engineering and Applications Symposium, IDEAS'06.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献