Sciweavers

71 search results - page 2 / 15
» Recovery from Malicious Transactions
Sort
View
VLDB
1990
ACM
83views Database» more  VLDB 1990»
13 years 9 months ago
A Formal Approach to Recovery by Compensating Transactions
Compensating transactions are intended to handle situations where it is required to undo either committed or uncommitted transactions that affect other transactions, without resor...
Henry F. Korth, Eliezer Levy, Abraham Silberschatz
ACSAC
2001
IEEE
13 years 8 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
ICDE
1997
IEEE
136views Database» more  ICDE 1997»
14 years 6 months ago
Delegation: Efficiently Rewriting History
Transaction delegation, as introduced in ACTA, allows a transaction to transfer responsibility for the operations that it has performed on an object to another transaction. Delega...
Cris Pedregal Martin, Krithi Ramamritham
MOBIDE
2005
ACM
13 years 10 months ago
Recovery of mobile internet transactions: algorithm, implementation and analysis
The increasing popularity of mobile devices and the support of web portals towards performing transactions from these mobile devices has enabled business on the move. However, int...
Shashi Anand, Krithi Ramamritham
TC
2002
13 years 4 months ago
Support for Recovery in Mobile Systems
Abstract--Mobile systems increasingly are being used for production-grade datacentered applications which require system support for transactional properties. For mobile applicatio...
Cris Pedregal Martin, Krithi Ramamritham