Sciweavers

11 search results - page 3 / 3
» Designing a Procedure for the Acquisition of Probability Con...
Sort
View
ACSAC
2006
IEEE
13 years 11 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu