A single-level scheduler for the replicated architecture for multilevel-secure databases
暂无分享,去创建一个
[1] Cristi Garvey,et al. The Advanced Secure DBMS: Making Secure DBMSs Usable , 1988, DBSec.
[2] Christos H. Papadimitriou,et al. The Theory of Database Concurrency Control , 1986 .
[3] Oliver Costich,et al. Analysis of a storage channel in the two phase commit protocol , 1991, Proceedings Computer Security Foundations Workshop IV.
[4] Oliver Costich. Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture , 1991, DBSec.
[5] Glenn H. MacEwen,et al. Effects of Distributed System Technology on Database Security: A Survey , 1988, DBSec.
[6] Thomas H. Hinke,et al. DBMS Technology vs. Threats , 1988, DBSec.
[7] Sushil Jajodia,et al. Transaction processing in multilevel-secure databases using replicated architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Dorothy E. Denning. Commutative Filters for Reducing Inference Threats in Multilevel Database Systems , 1985, 1985 IEEE Symposium on Security and Privacy.
[9] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[10] Richard D. Graubart,et al. The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.
[11] Ira B. Greenberg,et al. Single-level multiversion schedulers for multilevel secure database systems , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[12] Catherine A. Meadows,et al. Achieving a Trusted Database Management System Using Parallelism , 1988, DBSec.
[13] Jaideep Srivastava,et al. Multilevel secure database concurrency control , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.