Storage Jamming
暂无分享,去创建一个
[1] John E. Dobson,et al. Database security IX: Status and prospects , 1996 .
[2] Andreas Reuter,et al. Transaction Processing: Concepts and Techniques , 1992 .
[3] Dan Thomsen,et al. A comparison of type enforcement and Unix setuid implementation of well-formed transactions , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[4] Simon R. Wiseman,et al. The Control of Integrity in Databases , 1990, DBSec.
[5] Ravi S. Sandhu,et al. Separation of Duties in Computerized Information Systems , 1990, DBSec.
[6] Z. G. Ruthberg,et al. Report of the Invitational Workshop on Data Integrity | NIST , 1989 .
[7] TERMINOLOGY, CRITERIA AND SYSTEM ARCHITECTURES FOR DATA INTEGRITY , 1989 .
[8] Jeffrey D. Uuman. Principles of database and knowledge- base systems , 1989 .
[9] Morrie Gasser,et al. Building a Secure Computer System , 1988 .
[10] Andrew Wood,et al. The trusted path between SMITE and the user , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[11] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[12] Thomas H. Hinke,et al. DBMS Technology vs. Threats , 1988, DBSec.
[13] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.