Concurrency control in multilevel-secure databases based on replicated architecture
暂无分享,去创建一个
[1] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[2] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[3] Catherine A. Meadows,et al. Achieving a Trusted Database Management System Using Parallelism , 1988, DBSec.
[4] Hector Garcia-Molina,et al. Update propagation in Bakunin data networks , 1987, PODC '87.
[5] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[6] Glenn H. MacEwen,et al. Effects of Distributed System Technology on Database Security: A Survey , 1988, DBSec.
[7] Irving L. Traiger,et al. The Recovery Manager of the System R Database Manager , 1981, CSUR.
[8] Jim Gray,et al. Notes on Data Base Operating Systems , 1978, Advanced Course: Operating Systems.
[9] Catherine D. Jensen,et al. SDDM-a prototype of a distributed architecture for database security , 1989, [1989] Proceedings. Fifth International Conference on Data Engineering.
[10] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[11] David P. Reed,et al. Synchronization with eventcounts and sequencers , 1979, CACM.
[12] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[13] Thomas H. Hinke,et al. A Layered TCB Implementation versus the Hinke-Schaefer Approach , 1989, Database Security.
[14] Sushil Jajodia,et al. Transaction processing in multilevel-secure databases using replicated architecture , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Richard D. Graubart,et al. A Comparison of Three Secure DBMS Architectures , 1989, DBSec.