Transaction processing in multilevel-secure databases using replicated architecture
暂无分享,去创建一个
[1] Hector Garcia-Molina,et al. Update propagation in Bakunin data networks , 1987, PODC '87.
[2] Catherine D. Jensen,et al. SDDM-a prototype of a distributed architecture for database security , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.
[3] David P. Reed,et al. Synchronization with eventcounts and sequencers , 1979, CACM.
[4] Glenn H. MacEwen,et al. Effects of Distributed System Technology on Database Security: A Survey , 1988, DBSec.
[5] Richard D. Graubart,et al. A Comparison of Three Secure DBMS Architectures , 1989, DBSec.
[6] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[7] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[8] Jim Gray,et al. Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.
[9] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[10] Thomas H. Hinke,et al. A Layered TCB Implementation versus the Hinke-Schaefer Approach , 1989, Database Security.
[11] Thomas H. Hinke,et al. DBMS Technology vs. Threats , 1988, DBSec.
[12] Michael J Grohn,et al. A Model of a Protected Data Management System. , 1976 .
[13] Irving L. Traiger,et al. The Recovery Manager of the System R Database Manager , 1981, CSUR.