Identification of Malicious Transactions in Database Systems.
Yi HuBrajendra PandaPublished in: IDEAS (2003)
Keyphrases
- database systems
- transaction processing
- transaction management
- distributed database systems
- concurrency control
- database
- multilevel secure
- database operations
- real time database systems
- commercial database systems
- data model
- query optimization
- real time
- automatic identification
- relational database systems
- data types
- database management systems
- databases
- database server
- database design
- multidatabase systems
- transactional data
- spatio temporal databases
- data management
- response time
- malicious users