Authorizations in relational database management systems
暂无分享,去创建一个
[1] Irving L. Traiger,et al. System R: A Relational Approach to Data Base Management , 1976, Berkeley Workshop.
[2] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[3] Dorothy E. Denning,et al. The SeaView security model , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[4] Bruce G. Lindsay,et al. A Database Authorization Mechanism Supporting Individual and Group Authorization , 1981, DDSS.
[5] Ronald Fagin,et al. On an authorization mechanism , 1978, TODS.
[6] Irving L. Traiger,et al. System R: relational approach to database management , 1976, TODS.
[7] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[8] Elisa Bertino,et al. A model of authorization for next-generation database systems , 1991, TODS.
[9] Elisa Bertino,et al. Views and Security in Distributed Database Management Systems , 1988, EDBT.
[10] Irving L. Traiger,et al. A history and evaluation of System R , 1981, CACM.