Login / Signup
Application-Level Isolation to Cope with Malicious Database Users.
Sushil Jajodia
Peng Liu
Catherine D. McCollum
Published in:
ACSAC (1998)
Keyphrases
</>
application level
database
databases
bottle neck
user interface
relational databases
end users
operating system
query language
database management systems
data management
network management
malicious users
database systems
user interaction
database applications
overlay network
cooperative