Evaluating Security of New Locking SIB-based Architectures.
Yogendra SaoAnjum RiazSatyadev AhlawatSk Subidh AliPublished in: ETS (2022)
Keyphrases
- information security
- security issues
- security threats
- functional requirements
- security requirements
- concurrency control
- network security
- security mechanisms
- computer security
- security analysis
- information assurance
- security problems
- security policies
- statistical databases
- intrusion detection
- access control
- security vulnerabilities
- transaction processing systems
- database
- security management
- malware detection
- database systems