Design and implementation of a query processor for a trusted distributed data base management system
暂无分享,去创建一个
[1] Marvin Schaefer,et al. Secure Data Management System. , 1975 .
[2] Bhavani M. Thuraisingham. Multilevel security issues in distributed database management systems II , 1991, Comput. Secur..
[3] Bhavani M. Thuraisingham,et al. Security checking in relational database management systems augmented with inference engines , 1987, Comput. Secur..
[4] Bhavani M. Thuraisingham,et al. Design of LDV: a multilevel secure relational database management system , 1990 .
[5] Bhavani M. Thuraisingham,et al. Multilevel security issues in distributed database management systems , 1988, Comput. Secur..
[6] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[7] Richard D. Graubart,et al. The Integrity-Lock Approach to Secure Database Management , 1984, 1984 IEEE Symposium on Security and Privacy.
[8] Clement T. Yu,et al. On the design of a query processing strategy in a distributed database environment , 1983, SIGMOD '83.
[9] Bhavani M. Thuraisingham,et al. Secure query processing in distributed database management systems-design and performance studies , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[10] Stefano Ceri,et al. Distributed Databases: Principles and Systems , 1984 .
[11] Stephen T. Walker. Network Security Overview , 1985, 1985 IEEE Symposium on Security and Privacy.
[12] Eugene Wong,et al. Query processing in sdd-i: a system for distributed databases , 1979 .
[13] Dorothy E. Denning,et al. A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.