共 34 条
[1]
Abiteboul S., 1995, FDN DATABASES
[2]
Ahmadian A. M., 2023, Divert
[3]
Ahmadian AM, 2024, Arxiv, DOI arXiv:2312.10441
[4]
Askarov A, 2008, LECT NOTES COMPUT SC, V5283, P333
[5]
JS']JSLINQ: Building Secure Applications across Tiers
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:307-318
[6]
Bender G, 2014, SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, P1411
[7]
Bender GabrielM., 2013, SIGMOD, DOI [10.1145/2463676.2467798, DOI 10.1145/2463676.2467798]
[9]
Brewer D. F. C., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P206, DOI 10.1109/SECPRI.1989.36295
[10]
Chlipala A., 2010, S OPERATING SYSTEM D, P105