Computer Science ›› 2006, Vol. 33 ›› Issue (6): 112-114.

Previous Articles     Next Articles

DENG Wei, WU Zhong-Fu ,YE Chun-Xiao ,ZHONG Jiang (Department of Computer Science and Technology, Chongqing University, Chongqing 400044)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: In face of attacks,it's very important for database system to protect the key data from intrusions and dynamically locate and repair the damage caused by the intrusions. Nowadays, lots of medium and mini-type network databases have no redundancy to guaran

Key words: Intrusion tolerant, Access control, Role, Database

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!