Detection of Malicious User in Oracle 10g DBMS and Cost of Elimination
暂无分享,去创建一个
[1] Raju Mehta. Oracle Database Security , 2004, Inf. Secur. J. A Glob. Perspect..
[2] Elisa Bertino,et al. Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.
[3] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[4] Teresa F. Lunt,et al. Access Control Policies for Database Systems , 1988, DBSec.
[5] Min Wang,et al. Cryptography and relational database management systems , 2001, Proceedings 2001 International Database Engineering and Applications Symposium.