Fine-grained access control to web databases
暂无分享,去创建一个
[1] Bradford W. Wade,et al. An authorization mechanism for a relational data base system , 1976, SIGMOD '76.
[2] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[3] Mary Chipman,et al. Microsoft Access Developer's Guide to Microsoft SQL Server , 2000 .
[4] Yi Hu,et al. A data mining approach for database intrusion detection , 2004, SAC '04.
[5] Giovanni Vigna,et al. A Learning-Based Approach to the Detection of SQL Attacks , 2005, DIMVA.
[6] Raghu Ramakrishnan,et al. Database Management Systems , 1976 .
[7] Joseph Lee,et al. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions , 2002, ICEIS.
[8] Johann Eder,et al. View Definitions with Parameters , 1995, ADBIS.
[9] Angelos D. Keromytis,et al. SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.
[10] Elisa Bertino,et al. An Extended Authorization Model for Relational Databases , 1997, IEEE Trans. Knowl. Data Eng..
[11] William Stallings,et al. Cryptography and network security , 1998 .
[12] Hasan M. Jamil. GQL: a reasonable complex SQL for genomic databases , 2000, Proceedings IEEE International Symposium on Bio-Informatics and Biomedical Engineering.
[13] SQL Injection Signatures Evasion , 2004 .