Surviving information warfare attacks on databases
暂无分享,去创建一个
[1] John P. McDermott,et al. Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[2] Hermann Kopetz,et al. Fault tolerance, principles and practice , 1990 .
[3] David Mattox. Indeed: an active database for concurrent engineering , 1994 .
[4] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Jennifer Widom,et al. Active Database Systems , 1995, Modern Database Systems.
[6] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[7] Nancy G. Leveson,et al. Safeware: System Safety and Computers , 1995 .
[8] Sushil Jajodia,et al. On-The-Fly Reading of Entire Databases , 1995, IEEE Trans. Knowl. Data Eng..
[9] Calton Pu,et al. Performance Evaluation of Global Reading of Entire Databases , 1988, Proceedings [1988] International Symposium on Databases in Parallel and Distributed Systems.
[10] Michael Reinfrank,et al. Truth Maintenance Systems , 1990, Lecture Notes in Computer Science.
[11] John P. McDermott,et al. Storage Jamming , 1995, DBSec.
[12] Abraham Silberschatz,et al. Database System Concepts , 1980 .
[13] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[14] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[15] Kenneth D. Forbus,et al. Building Problem Solvers , 1993 .
[16] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..