Integrity Mechanisms in Database Management Systems
暂无分享,去创建一个
[1] C. J. Date. An Introduction to Database Systems, Volume I, 5th Edition , 1986 .
[2] R. Sandhu. Transformation of access rights , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[3] Eduardo B. Fernandez,et al. Database Security and Integrity , 1981 .
[4] 共立出版株式会社. コンピュータ・サイエンス : ACM computing surveys , 1978 .
[5] Stuart W. Katzke,et al. Report of the Invitational Workshop on Integrity Policy in Computer Information Systems (WIPCIS) , 1989 .
[6] Sushil Jajodia,et al. Audit Trail Organization in Relational Databases , 1989, DBSec.
[7] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[8] Joseph H. Wimbrow. A Large Scale Interactive Administrative System , 1971, IBM Syst. J..
[9] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[10] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[11] Jim Gray,et al. Why Do Computers Stop and What Can Be Done About It? , 1986, Symposium on Reliability in Distributed Software and Database Systems.
[12] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[13] Theodore A. Linden. Operating System Structures to Support Security and Reliable Software , 1976, CSUR.
[14] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[15] F. Poole,et al. Distributed data bases , 1980 .
[16] Jim Gray,et al. Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.
[17] Morris Sloman,et al. The source of authority for commercial access control , 1988, Computer.