Database design and MLS DBMSs: an unhappy alliance?
暂无分享,去创建一个
[1] J. Thomas Haigh,et al. The LDV Approach to Database Security , 1989, DBSec.
[2] Simon R. Wiseman,et al. Using SWORD for the Military Aircraft Command Example Database , 1993, DBSec.
[3] Dorothy E. Denning,et al. A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.
[4] Günther Pernul,et al. Security constraint processing during multilevel secure database design , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[5] E. F. Codd,et al. A relational model of data for large shared data banks , 1970, CACM.
[6] E. F. CODD,et al. A relational model of data for large shared data banks , 1970, CACM.
[7] Simon R. Wiseman. Abstract and Concrete Models for Secure Database Applications , 1991, DBSec.
[8] Simon R. Wiseman. The conflict between confidentiality and integrity , 1991, Proceedings Computer Security Foundations Workshop IV.
[9] Teresa F. Lunt,et al. Tuple-level vs Element-level Classification , 1993, Database Security.
[10] G. W. Smith. Identifying and representing the security semantics of an application , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[11] Peter P. Chen. The entity-relationship model: toward a unified view of data , 1975, VLDB '75.