Sciweavers

251 search results - page 12 / 51
» Transactions with isolation and cooperation
Sort
View
ADBIS
2004
Springer
153views Database» more  ADBIS 2004»
14 years 3 months ago
Cooperative Transaction Processing between Clients and Servers
Business rules are often implemented as stored procedures in a database server. These procedures are triggered by various clients, but the execution load is fully centralized on th...
Steffen Jurk, Ulf Leser, José-Luis Marzo
HICSS
1996
IEEE
99views Biometrics» more  HICSS 1996»
14 years 2 months ago
Cooperative Transactions: A Data-Driven Approach
Marcus Costa Sampaio, Stéphane Turc
CODAS
1996
57views more  CODAS 1996»
13 years 11 months ago
Transaction Models Supporting Cooperative Work - The TransCoop Experiences
Karl Aberer, Justus Klingemann, Thomas Tesch, J&uu...
ACSAC
1998
IEEE
14 years 2 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
EUROSYS
2008
ACM
14 years 7 months ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...