【24h】

Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution

机译:将提交的事务存储在日志中以备将来重新执行的替代方法

获取原文
获取原文并翻译 | 示例

摘要

Computer systems all around the world are prone to attacks from malicious users. Prevention of attacks on systems, although not impossible, admittedly, is impractical. Hence, the next best thing to do would be to recover the database from an attack in a quick and efficient way. The log file stores the operations of the transactions and this information can be used to recover the database. Several approaches have been proposed to recover the database from an attack, like the transaction dependency approach, the data dependency approach to name a few. But these methods take up valuable system resources to do a significant amount of computation to build the log file while the operations of the transactions are still on. In this research, we propose alternate methods that use less time to build the log thus increasing the system through put. With the help of efficient algorithms, we can assess the damage in a quick and efficient way. This paper proposes two techniques to build the log based on certain factors; number of committed transactions and time.
机译:世界各地的计算机系统都容易受到恶意用户的攻击。诚然,防止对系统的攻击虽然并非不可能,但并非不可能。因此,下一个最好的事情就是以快速有效的方式从攻击中恢复数据库。日志文件存储事务的操作,此信息可用于恢复数据库。已经提出了几种从攻击中恢复数据库的方法,例如事务依赖方法,数据依赖方法等。但是这些方法占用了宝贵的系统资源来进行大量计算,以构建日志文件,而事务操作仍在进行中。在这项研究中,我们提出了一些替代方法,这些方法使用较少的时间来构建日志,从而增加了系统的吞吐量。借助高效的算法,我们可以快速有效地评估损坏。本文提出了两种基于特定因素构建日志的技术:承诺交易的数量和时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号