Collecting garbage in multilevel secure object stores
暂无分享,去创建一个
[1] Richard D. Graubart,et al. A Comparison of Three Secure DBMS Architectures , 1989, DBSec.
[2] David Maier,et al. The GemStone Data Management System , 1989, Object-Oriented Concepts, Databases, and Applications.
[3] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[4] Luigi V. Mancini,et al. Copying garbage collection for distributed object stores , 1991, [1991] Proceedings Tenth Symposium on Reliable Distributed Systems.
[5] Sushil Jajodia,et al. Integrating an object-oriented data model with multilevel security , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] M. B. Thuraisingham. Mandatory security in object-oriented database systems , 1989, OOPSLA 1989.
[7] Chris J. Cheney. A nonrecursive list compacting algorithm , 1970, Commun. ACM.
[8] Santosh K. Shrivastava,et al. Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems , 1991, Comput. J..
[9] Elliot K. Kolodner,et al. Garbage Collection: Managing a Stable Heap , 2022 .
[10] Sushil Jajodia,et al. Referential Integrity in Multilevel Secure Database Management Systems , 1992, SEC.
[11] Benjamin G. Zorn,et al. Comparative performance evaluation of garbage collection algorithms , 1989 .
[12] Elisa Bertino,et al. Modeling Multilevel Entities Using Single Level Objects , 1993, DOOD.
[13] Bhavani M. Thuraisingham,et al. Mandatory security in object-oriented database systems , 1989, OOPSLA '89.
[14] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[15] Ken Kennedy,et al. Compiling Fortran D for MIMD distributed-memory machines , 1992, CACM.
[16] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[17] J. Eliot B. Moss,et al. Working with Persistent Objects: To Swizzle or Not to Swizzle , 1992, IEEE Trans. Software Eng..
[18] Elisa Bertino,et al. Data hiding and security in object-oriented databases , 1992, [1992] Eighth International Conference on Data Engineering.
[19] Jonathan K. Millen,et al. Security for object-oriented database systems , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[20] Elisa Bertino,et al. Object-Oriented Database Systems: Concepts and Architectures , 1993 .
[21] Sushil Jajodia,et al. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Ehud Gudes,et al. A Model of Methods Access Authorization in Object-oriented Databases , 1993, VLDB.
[23] O. Deux,et al. The Story of O2 , 1990, IEEE Trans. Knowl. Data Eng..