{"id":"https://openalex.org/W2581882029","doi":"https://doi.org/10.4018/ijswis.2017040105","title":"Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix","display_name":"Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix","publication_year":2017,"publication_date":"2017-01-30","ids":{"openalex":"https://openalex.org/W2581882029","doi":"https://doi.org/10.4018/ijswis.2017040105","mag":"2581882029"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijswis.2017040105","pdf_url":null,"source":{"id":"https://openalex.org/S181240966","display_name":"International Journal on Semantic Web and Information Systems","issn_l":"1552-6283","issn":["1552-6283","1552-6291"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078450687","display_name":"Ramzi A. Haraty","orcid":"https://orcid.org/0000-0002-6978-3627"},"institutions":[{"id":"https://openalex.org/I56306041","display_name":"Lebanese American University","ror":"https://ror.org/00hqkan37","country_code":"LB","type":"funder","lineage":["https://openalex.org/I56306041"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ramzi Ahmed Haraty","raw_affiliation_strings":["Lebanese American University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Lebanese American University, Beirut, Lebanon","institution_ids":["https://openalex.org/I56306041"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029687258","display_name":"Sanaa Kaddoura","orcid":"https://orcid.org/0000-0002-4384-4364"},"institutions":[{"id":"https://openalex.org/I36314861","display_name":"Beirut Arab University","ror":"https://ror.org/02jya5567","country_code":"LB","type":"funder","lineage":["https://openalex.org/I36314861"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Sanaa Kaddoura","raw_affiliation_strings":["Beirut Arab University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Beirut Arab University, Beirut, Lebanon","institution_ids":["https://openalex.org/I36314861"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002750875","display_name":"Ahmed Zekri","orcid":"https://orcid.org/0000-0001-8518-1581"},"institutions":[{"id":"https://openalex.org/I36314861","display_name":"Beirut Arab University","ror":"https://ror.org/02jya5567","country_code":"LB","type":"funder","lineage":["https://openalex.org/I36314861"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Ahmed Zekri","raw_affiliation_strings":["Beirut Arab University, Beirut, Lebanon"],"affiliations":[{"raw_affiliation_string":"Beirut Arab University, Beirut, Lebanon","institution_ids":["https://openalex.org/I36314861"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.188,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":7,"citation_normalized_percentile":{"value":0.795971,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":82,"max":83},"biblio":{"volume":"13","issue":"2","first_page":"74","last_page":"86"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9982,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rollback","display_name":"Rollback","score":0.7275972},{"id":"https://openalex.org/keywords/transaction-log","display_name":"Transaction log","score":0.56339014}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8688202},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.73048687},{"id":"https://openalex.org/C174220543","wikidata":"https://www.wikidata.org/wiki/Q395307","display_name":"Rollback","level":3,"score":0.7275972},{"id":"https://openalex.org/C2212953","wikidata":"https://www.wikidata.org/wiki/Q948454","display_name":"Transaction log","level":3,"score":0.56339014},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.54257005},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.51608604},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4529459},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.42033327},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijswis.2017040105","pdf_url":null,"source":{"id":"https://openalex.org/S181240966","display_name":"International Journal on Semantic Web and Information Systems","issn_l":"1552-6283","issn":["1552-6283","1552-6291"],"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.61,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W1964549039","https://openalex.org/W2065123591","https://openalex.org/W2147343186","https://openalex.org/W2150022710","https://openalex.org/W2273651132","https://openalex.org/W2317250414","https://openalex.org/W796084543"],"related_works":["https://openalex.org/W3127200684","https://openalex.org/W2393779616","https://openalex.org/W2373786169","https://openalex.org/W2347434268","https://openalex.org/W2154958021","https://openalex.org/W2119843648","https://openalex.org/W2010356481","https://openalex.org/W1986934249","https://openalex.org/W1541273212","https://openalex.org/W1500452936"],"abstract_inverted_index":{"One":[0],"of":[1,86,104,133],"the":[2,6,45,56,68,75,79,84,87,116,120,134,154],"critical":[3,17],"concerns":[4],"in":[5,67,119,145,163],"current":[7],"era":[8],"is":[9,35,39,63,101,156],"information":[10,62,144],"security.":[11],"Companies":[12],"are":[13,47],"sharing":[14],"vast":[15],"online":[16],"data,":[18],"which":[19,100],"exposes":[20],"their":[21],"databases":[22],"to":[23,30,83,114],"malicious":[24,81,123],"attacks.":[25],"When":[26],"protection":[27],"techniques":[28,52],"fail":[29],"prevent":[31],"an":[32,109],"attack,":[33],"recovery":[34,38,51],"needed.":[36],"Database":[37],"not":[40,54,64],"a":[41,102,146],"straightforward":[42],"procedure,":[43],"since":[44],"transactions":[46,59,76,95,135],"highly":[48],"interconnected.":[49],"Traditional":[50],"do":[53],"consider":[55],"interconnection":[57],"between":[58],"because":[60],"this":[61,143,164],"saved":[65],"anywhere":[66],"log":[69,88],"file.":[70,89],"Thus,":[71],"they":[72],"rollback":[73],"all":[74],"starting":[77],"from":[78,138],"detected":[80],"transaction":[82,124],"end":[85],"Hence,":[90],"both":[91],"affected":[92],"and":[93,125,141],"benign":[94],"will":[96],"be":[97],"rolled":[98],"back,":[99],"waste":[103],"time.":[105],"This":[106],"paper":[107],"presents":[108],"algorithm":[110,130,155,162],"that":[111,136,153],"works":[112],"efficiently":[113],"assess":[115],"damage":[117],"caused":[118],"database":[121],"by":[122],"recovers":[126],"it.":[127],"The":[128,149],"proposed":[129],"keeps":[131],"track":[132],"read":[137],"one":[139],"another":[140],"store":[142],"single":[147],"matrix.":[148],"experimental":[150],"results":[151],"prove":[152],"faster":[157],"than":[158],"any":[159],"other":[160],"existing":[161],"domain.":[165]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2581882029","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-04-23T19:08:23.999733","created_date":"2017-02-03"}