Rewriting Histories: Recovering from Malicious Transactions.
Peng LiuPaul AmmannSushil JajodiaPublished in: Distributed Parallel Databases (2000)
Keyphrases
- malicious attacks
- rewriting rules
- rewrite rules
- database
- transaction management
- query rewriting
- detect malicious
- malicious behavior
- conjunctive queries
- distributed database systems
- database transactions
- concurrency control protocols
- transactional data
- concurrency control
- concurrent execution
- rewriting systems
- presburger arithmetic
- credit card
- distributed systems
- special case
- neural network
- data sets