An Architecture of a Secure Database for Networked Collaborative Activities
暂无分享,去创建一个
[1] Steven M. Bellovin,et al. Problem Areas for the IP Security Protocols , 1996, USENIX Security Symposium.
[2] Ehud Gudes,et al. A Model for Evaluation and Administration of Security in Object-Oriented Databases , 1994, IEEE Trans. Knowl. Data Eng..
[3] W.A. Arbaugh,et al. Security for Virtual Private Intranets , 1998, Computer.
[4] Cheryl Madson,et al. The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.
[5] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[6] Cheryl Madson,et al. The Use of HMAC-MD5-96 within ESP and AH , 1998, RFC.
[7] M. Kudo. Access Control Model with Provisional Actions , 2001 .
[8] Anup K. Ghosh. E-Commerce Security and Privacy , 2001, Advances in Information Security.
[9] George Pangalos,et al. A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems , 2001, ISC.
[10] Klaus R. Dittrich,et al. Argos - A Configurable Access Control System for Interoperable Environments , 1995, DBSec.
[11] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[12] Danielle Boulanger,et al. A Role-Based Model for Access Control in Database Federations , 2001, ICICS.
[13] Kanta Matsuura. Virtual private laboratories: concept and two building blocks , 2002, IEEE International Engineering Management Conference.