2003
DOI: 10.1109/tkde.2003.1232268
|View full text |Cite
|
Sign up to set email alerts
|

Detection and recovery techniques for database corruption

Abstract: Increasingly, for extensibility and performance, special purpose application code is being integrated with database system code. Such application code has direct access to database system buffers, and as a result, the danger of data being corrupted due to inadvertent application writes is increased. Previously proposed hardware techniques to protect from corruption require system calls, and their performance depends on details of the hardware architecture. We investigate an alternative approach which uses code… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2004
2004
2019
2019

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…The MOSAIQ documentation describing HL7 V2.x import into CA provides minimal specific details about Table Items import ( [33], Section 11.27), which was our preferred method for the import and population of ePRO surveys in MOSAIQ. The MOSAIQ HL7 import provides error and identity checking functions making it a clean and robust import method without the risk of data corruption associated with the direct database write access alternative [34]. Fortunately, discussions with the MOSAIQ Help desk revealed that Table Item import is possible.…”
Section: Mosaiq Integrationmentioning
confidence: 99%
“…The MOSAIQ documentation describing HL7 V2.x import into CA provides minimal specific details about Table Items import ( [33], Section 11.27), which was our preferred method for the import and population of ePRO surveys in MOSAIQ. The MOSAIQ HL7 import provides error and identity checking functions making it a clean and robust import method without the risk of data corruption associated with the direct database write access alternative [34]. Fortunately, discussions with the MOSAIQ Help desk revealed that Table Item import is possible.…”
Section: Mosaiq Integrationmentioning
confidence: 99%
“…Other systems use these features and add encryption techniques for distributing storage [25]. Architectures for damage assessment and self-healing databases have also been proposed [9,11,12,23,24]. Although strongly effective for availability purposes, data replication techniques are always an important issue in DWs, given the volume of data and storage size typically involved.…”
Section: B Reactive Data Security Solutionsmentioning
confidence: 99%
“…However, these techniques cannot detect UE problems that may or may not be handled by exception handlers. There have been some works focusing on preventing and detecting persistency bugs in storage systems, such as le systems and database systems [1,6,7,11,16,38,45,46]. For example, if a storage system crashes during the process of writing data, the system has to carefully roll back the operation to avoid data corruption.…”
Section: Introductionmentioning
confidence: 99%