Recovery from Malicious Transactions.
Paul AmmannSushil JajodiaPeng LiuPublished in: IEEE Trans. Knowl. Data Eng. (2002)
Keyphrases
- transactional data
- database
- malicious attacks
- malicious behavior
- concurrency control
- credit card
- transaction processing
- detect malicious
- malicious users
- recovery algorithm
- database transactions
- image recovery
- distributed database systems
- case study
- frequent patterns
- fine grained
- failure recovery
- electronic commerce
- data structure
- detecting malicious