Detecting malicious data access in a distributed environment
Abstract:
Systems, methods, and computer program products to perform an operation comprising identifying a first access to a first subset of a first database table on a first storage node, of a plurality of storage nodes, identifying a second access to a second subset of the first database table on a second storage node, of the plurality of storage nodes, and performing a predefined operation to restrict access to the first database table on the plurality of storage nodes based on the first and second accesses.
Public/Granted literature
Information query
Patent Agency Ranking
0/0