... clean files. If the corrupt activities of the data model can be narrowed down to a couple of files it may be easy to swap the files with clean files from the source code of the DBMS. This approach adheres to both the criteria if applied ...
Fifth World Conference on Information Security Education: Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA