As a program transformation technique,control dependence can be converted to data dependecnce by predi-catted execution with some architectural support. Predica
Main focus of database security research is maintaining data security and providing timely data services. Toensure security, inference attack and aggregate atta