Prioritäten für eine verteilte, objekt-orientierte Zugriffskontrolle
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[2] Ehud Gudes,et al. Security Policies in Object-Oriented Databases , 1989, DBSec.
[3] Tomás Lang,et al. Definition and evaluation of access rules in data management systems , 1975, VLDB '75.
[4] Won Kim,et al. Research directions in object-oriented database systems , 1990, PODS.
[5] Udo Kelter. Discretionary access controls in a high-performance object management system , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[7] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[8] Won Kim,et al. A Model of Authorization for Object-Oriented and Semantic Databases , 1988, EDBT.
[9] Eduardo B. Fernandez,et al. Database Security and Integrity , 1981 .
[10] David J. DeWitt,et al. The Object-Oriented Database System Manifesto , 1994, Building an Object-Oriented Database System, The Story of O2.
[11] Ehud Gudes,et al. A security model for object-oriented databases , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[12] Klaus R. Dittrich,et al. Discretionary Access Control in Structurally Object-Oriented Database Systems , 1988, DBSec.
[13] Luis-Felipe Cabrera,et al. CACL: efficient fine-grained protection for objects , 1992, OOPSLA 1992.