Survey on Security Issues and Their Techniques in DBMS
暂无分享,去创建一个
[1] Elisa Bertino,et al. Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.
[2] Marco Vieira,et al. Detection of malicious transactions in DBMS , 2005, 11th Pacific Rim International Symposium on Dependable Computing (PRDC'05).
[3] B. Borowik,et al. Modern Approaches to the Database Protection , 2007, 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[4] Yu Chen,et al. Protection of Database Security via Collaborative Inference Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.
[5] B. B. Meshram,et al. A Implementation of Object Oriented Database Security , 2007, 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007).
[6] Dongmei Huang,et al. Model Design of Role-Based Access Control and Methods of Data Security , 2010, 2010 International Conference on Web Information Systems and Mining.
[7] Shukor Abd Razak,et al. System architecture for SQL injection and insider misuse detection system for DBMS , 2008, 2008 International Symposium on Information Technology.