Cache Bypassing and Checkpointing to Circumvent Data Security Attacks on STTRAM.
Seyedhamidreza MotamanSwaroop GhoshNitin RathiPublished in: IEEE Trans. Emerg. Top. Comput. (2019)
Keyphrases
- data security
- access control
- distributed databases
- data integrity
- data management
- data centric
- distributed database systems
- data access
- query processing
- distributed systems
- information security
- data privacy
- privacy preserving data mining
- third party
- database
- database design
- business processes
- intrusion detection
- data analysis
- information systems
- data mining
- databases