In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is to achieve security against external attacks (e.g....
This course was an experiment in several respects. For
one, we wanted to teach a systems course with a practical
part in which students apply the material taught to build
the co...
High availability for both data and applications is rapidly becoming a business requirement. While database systems support recovery, providing high database availability, applica...