2019
DOI: 10.3103/s0146411619080261
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Management System Security Threat Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…If the error retry times reach or exceed the upper limit, it means that there is a problem with the input data. It is put into the failed data queue 21 . Modify the table structure of the database, and need to update all data elements under the corresponding table structure to meet the constraint requirements.…”
Section: Blockchain Technology and Financial Enterprise Data Processingmentioning
confidence: 99%
See 1 more Smart Citation
“…If the error retry times reach or exceed the upper limit, it means that there is a problem with the input data. It is put into the failed data queue 21 . Modify the table structure of the database, and need to update all data elements under the corresponding table structure to meet the constraint requirements.…”
Section: Blockchain Technology and Financial Enterprise Data Processingmentioning
confidence: 99%
“…It is put into the failed data queue. 21 Modify the table structure of the database, and need to update all data elements under the corresponding table structure to meet the constraint requirements. The framework provides stability of the application and transparency of data migration, which greatly simplifies the difficulty of writing parallel programs.…”
Section: Data Processing Security Systemmentioning
confidence: 99%
“…The social harm of cybercrime is easily overlooked by people. Nowadays, more and more online financial theft, online fraud, and the dissemination of pornographic information on the Internet make people gradually realize the harm that computer network brings to personal life (Poltavtseva 2019). However, the social harm caused by some cybercrimes is actually difficult for everyone to see, and even criminals are hard to predict.…”
Section: Concepts Related To Computer Cybercrimementioning
confidence: 99%