A Database Approach to Modelling and Managing Security Information
暂无分享,去创建一个
[1] Joel Arditi,et al. An Authorization Mechanism for a Data Base , 1978, JCDKB.
[2] Giampio Bracchi,et al. Interactive Specification And Formal Verification Of User's Views In Data Base Design , 1979, Fifth International Conference on Very Large Data Bases, 1979..
[3] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[4] Horst Biller,et al. On the equivalence of data base schemas - a semantic approach to data translation , 1979, Inf. Syst..
[5] Giampio Bracchi,et al. Structured methodology for designing static and dynamic aspects of data base applications , 1981, Inf. Syst..
[6] Eduardo B. Fernández,et al. Decentralized Authorization In A Database System , 1979, Fifth International Conference on Very Large Data Bases, 1979..
[7] Erich J. Neuhold,et al. Semantics of data bases: The semantics of data models , 1978, Inf. Syst..