Constrained obfuscation of relational databases.
Erez ShmueliTomer ZrihenRan YahalomTamir TassaPublished in: Inf. Sci. (2014)
Keyphrases
- relational databases
- reverse engineering
- database
- databases
- object oriented
- functional dependencies
- normal form
- relational data
- data sets
- data dependencies
- sql queries
- relational model
- xml documents
- database applications
- keyword search
- database schema
- expert systems
- static analysis
- knowledge base
- xml databases
- control flow
- information systems
- malware detection