Access control in a relational data base management system by query modification
暂无分享,去创建一个
[1] R. M. Graham. Protection in an information processing utility , 1968, CACM.
[2] Butler W. Lampson,et al. Dynamic protection structures , 1899, AFIPS '69 (Fall).
[3] Clark Weissman,et al. Security controls in the ADEPT-50 time-sharing system , 1899, AFIPS '69 (Fall).
[4] Lance Joel Hoffman,et al. The formulary model for access control and privacy in computer systems , 2018 .
[5] Theodore D. Friedman,et al. The Authorization Problem in Shared Files , 1970, IBM Syst. J..
[6] Peter S. Browne,et al. A model for access control , 1971, SIGFIDET '71.
[7] R. C. Owens. PRIMARY ACCESS CONTROL IN LARGE-SCALE TIME-SHARED DECISION SYSTEMS , 1971 .
[8] Richard C. Owens. Evaluation of access authorization characteristics of derived data sets , 1971, SIGFIDET '71.
[9] E. F. Codd,et al. A data base sublanguage founded on the relational calculus , 1971, SIGFIDET '71.
[10] E. F. Codd,et al. Relational Completeness of Data Base Sublanguages , 1972, Research Report / RJ / IBM / San Jose, California.
[11] Donald D. Chamberlin,et al. Using a Structured English Query Language as a Data Definition Facility , 1973, Research Report / RJ / IBM / San Jose, California.
[12] Michael Stonebraker,et al. A functional view of data independence , 1974, SIGFIDET '74.
[13] James B. Rothnie. An approach to implementing a relational data management system , 1974, SIGFIDET '74.
[14] Donald D. Chamberlin,et al. SEQUEL: A structured English query language , 1974, SIGFIDET '74.
[15] W. F. King,et al. Specifying queries as relational expressions , 1974 .