ABSTRACT
Solutions to the problem of consistency and correctness of duplicate database have been tackled by many authors such as in [Elli77], [Grap76], and [Mull71]. In a network system, each update may bring up a different kind of consistency and a new proof of correctness. Data integrity and security in a concurrent environment are a big headache for the system implementor. Issues related to security and social impacts on a network system are discussed in [Denn72]. This paper attempts to use a new method, Dataflow Language, to represent the interactions in a network environment, and in doing so, the paper, hopefully, points out the consistency, and correctness of the duplicate database.
Recommendations
Network and database security: regulatory compliance, network, and database security--a unified process and goal
InfoSecCD '07: Proceedings of the 4th annual conference on Information security curriculum developmentDatabase security has evolved; data security professionals have developed numerous techniques and approaches to assure data confidentiality, integrity, and availability. This paper will show that the Traditional Database Security, which has focused ...
The Security Mechanism of Network Database
ICMTMA '11: Proceedings of the 2011 Third International Conference on Measuring Technology and Mechatronics Automation - Volume 03The network database system is an open environment for information storage and management with massive data. Also may be confronted with frequent security attacks from many outside, which leads to a series of security problems. Great loss will occur ...
Applying deductive database technology to network management
Network Management is essential for successful operation of any communications network. Due to the complexity of modern networks, their management requires application of artificial intelligence based techniques. Two essential aspects of any Network ...
Comments