Proceedings of the 2nd International Conference on Computer Engineering, Information Science &Amp; Application Technology (ICCI 2017
DOI: 10.2991/iccia-17.2017.46
|View full text |Cite
|
Sign up to set email alerts
|

Security Workflow Model for Database Storage

Abstract: Abstract. The security workflow is proposed according to the transactional workflow discussed in this paper. When it comes to the security workflow, it is necessary to consider the compensation of the attack. In this paper, the recovery properties is introduced in security database workflow: non-vital property, compensable property, retriable property, critical property and replaceable property. With these properties discussed, the paper deeply analyses the abnormal workflow and advises the division of the abn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 8 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?