Login / Signup
Database Isolation and Filtering against Data Corruption Attacks.
Meng Yu
Wanyu Zang
Peng Liu
Published in:
ACSAC (2007)
Keyphrases
</>
data corruption
database
databases
buffer overflow
database systems
virtual memory
database management systems
database applications
database management
data management
data storage