Login / Signup
Efficient Logging and Replication Techniques for Comprehensive Data Protection.
Maohua Lu
Shibiao Lin
Tzi-cker Chiueh
Published in:
MSST (2007)
Keyphrases
</>
data protection
distributed databases
end users
access control
sensitive information
data mining
feature space
privacy protection