A reference model for database security proxy
暂无分享,去创建一个
[1] John P. McDermott. Replication Does Survive Information Warfare Attacks , 1997, DBSec.
[2] Richard D. Graubart,et al. Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS , 1985, 1985 IEEE Symposium on Security and Privacy.
[3] Eugene H. Spafford,et al. A reference model for firewall technology , 1997, Proceedings 13th Annual Computer Security Applications Conference.
[4] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[5] Sushil Jajodia,et al. Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[6] Dorothy E. Denning,et al. Commutative Filters for Reducing Inference Threats in Multilevel Database Systems , 1985, 1985 IEEE Symposium on Security and Privacy.