Database Recovery from Malicious Transactions: A Use of Provenance Information
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA)(2021)
Key words
Database,Malicious Transaction,Security,Dependency Graph,Data Provenance
AI Read Science
Must-Reading Tree
Example

Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined