Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337) 1999
DOI: 10.1109/icde.1999.754943
|View full text |Cite
|
Sign up to set email alerts
|

Using codewords to protect database data from a class of software errors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2000
2000
2009
2009

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…By logging the identity of the data items read by each transaction, i.e. R(T), previously suggested in [1] to handle application corruption via wild stores of data in a main memory database system, we have enough information recorded on the log to perform the computation of C(T c ) in section 3.1.…”
Section: Tracking Readsmentioning
confidence: 99%
“…By logging the identity of the data items read by each transaction, i.e. R(T), previously suggested in [1] to handle application corruption via wild stores of data in a main memory database system, we have enough information recorded on the log to perform the computation of C(T c ) in section 3.1.…”
Section: Tracking Readsmentioning
confidence: 99%
“…Researchers have also proposed techniques for protecting critical DBMS structures against errors [5], [29]. These techniques mainly deal with abnormal corruption caused by software errors, not deliberate attacks.…”
Section: Related Workmentioning
confidence: 99%
“…POSTGRES [24] and Dali [4] were two different approaches of protecting critical DBMS data structures against software errors. The former used hardware protection, while the latter used a wordcode software mechanism and also proposed a recovery algorithm for the corrupted transactions.…”
Section: Related Workmentioning
confidence: 99%