Sani Tripathy

Learn More
Recovery from information attacks is a difficult task as database management systems are not designed to deal with malicious committed transactions, Few existing methods developed for this purpose heavily rely on logs and require that the log must not be purged. This causes the log grow tremendously and, therefore, making recovery a prolonged process since(More)
  • 1