Attack recovery from malicious transactions in distributed database systems.
Anindya ChakrabortyManoj K. GargArun K. MajumdarShamik SuralPublished in: Int. J. Inf. Comput. Secur. (2008)
Keyphrases
- distributed database systems
- malicious users
- malicious attacks
- concurrency control
- distributed database management systems
- malicious activities
- deadlock detection
- transaction management
- database systems
- transaction processing
- distributed databases
- replicated data
- distributed systems
- detecting malicious
- normal traffic
- concurrency control algorithms
- database management systems
- distributed data management
- real time database systems
- data migration
- multidatabase systems
- real time databases
- distributed environment
- query processing
- management system
- database
- database applications
- intrusion detection system
- data management
- commit protocols
- intelligent systems
- anomaly detection
- multi agent systems