Login / Signup
Online Recovery of a Distributed Database from Malicious Attack.
Anindya Chakraborty
Manoj K. Garg
Arun K. Majumdar
Shamik Sural
Published in:
IDEAS (2006)
Keyphrases
</>
distributed databases
distributed environment
transaction processing
malicious users
distributed database systems
data replication
replicated data
high availability
concurrency control
data warehousing
concurrency control protocols
data sets
data management