共 14 条
- [1] ATLURI V, 1997, DATABASE SECURITY, V10, P240
- [2] BISKUP J, 1994, DATABASE SECURITY, V7, P3
- [3] Demurjian S, 2000, INT FED INFO PROC, V43, P79
- [4] FARMER WM, 1997, LNCS, V1146, P118
- [5] Ford Warwick, 1997, Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption
- [6] Garfinkel Simson., 1996, PRACTICAL UNIX INTER
- [7] Gudes E., 1999, Journal of Computer Security, V7, P287
- [8] Harel D., 1998, MODELING REACTIVE SY
- [9] MCCOLLUM CD, 1998, DATABASE SECURITY, V11, P17
- [10] Specifying application-level security in workflow systems [J]. NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, : 346 - 351