Application-level isolation to cope with malicious database users | IEEE Conference Publication | IEEE Xplore