An efficient secure real-time concurrency control protocol
暂无分享,去创建一个
[1] Sang Hyuk Son,et al. Supporting security requirements in multilevel real-time databases , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[2] Miron Livny,et al. On being optimistic about real-time constraints , 1990, PODS '90.
[3] Jayant R. Haritsa,et al. Secure transaction processing in firm real-time database systems , 1997, SIGMOD '97.
[4] Miron Livny,et al. Data access scheduling in firm real-time database systems , 1992, Real-Time Systems.
[5] Sang Hyuk Son,et al. Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity' , 2000, IEEE Trans. Knowl. Data Eng..
[6] Lui Sha,et al. A Real-Time Locking Protocol , 1991, IEEE Trans. Computers.
[7] Susan V. Vrbsky,et al. Maintaining security in firm real-time database systems , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).