Subject
Law,Hardware and Architecture,Software
Reference40 articles.
1. Security-control methods for statistical database: a comparative study;Adam;ACM Computing Surveys,1989
2. Message logging: pessimistic, optimistic, causal and optimal;Alvisi;IEEE Transactions on Software Engineering,1998
3. Recovery from malicious transactions;Ammann;IEEE Transactions on Knowledge and Data Engineering,2001
4. Multilevel Secure Transaction Processing;Atluri,1999
5. Using checksums to detect data corruption;Barbara,2000
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献