Referential Integrity In Multilevel Secure Databases
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[2] Sushil Jajodia,et al. Polyinstantiation integrity in multilevel relations , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Dan Thomsen,et al. The LDV Secure Relational DBMS Model , 1990, DBSec.
[4] Sushil Jajodia,et al. Referential Integrity in Multilevel Secure Database Management Systems , 1992, SEC.
[5] Sushil Jajodia,et al. Polyinstantation for Cover Stories , 1992, ESORICS.
[6] Ravi S. Sandhu. Enforcing Primary Key Requirements in Multilevel Relations , 1991 .
[7] Sushil Jajodia,et al. Update semantics for multilevel relations , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[8] Sushil Jajodia,et al. Honest Databases That Can Keep Secrets , 1991 .
[9] Dorothy E. Denning,et al. A Multilevel Relational Data Model , 1987, 1987 IEEE Symposium on Security and Privacy.
[10] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[11] Sushil Jajodia,et al. A novel decomposition of multilevel relations into single-level relations , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[12] Donovan Hsieh,et al. Update Semantics for a Multilevel Relational Database System , 1990, Database Security.
[13] Sushil Jajodia,et al. A new polyinstantiation integrity constraint for multilevel relations , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[14] Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990 , 1991, DBSec.
[15] Sushil Jajodia,et al. Polyinstantiation Integrity in Multilevel Relations Revisited , 1990, DBSec.
[16] G. E. Gajnak. Some results from the entity/relationship multilevel secure DBMS project , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[17] Rae K. Burns. Referential secrecy , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.