共 36 条
[1]
ADAMS MR, 1989, ACM COMPUTING SURVEY, V21
[2]
AJODIA S, 1997, P AC SIGMOD INT C MA, P474
[3]
Surviving information warfare attacks on databases
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:164-174
[5]
ATLURI V, 1999, MULTILEVEL SECURE T
[6]
BARBARA D, 2000, P 2000 INT C EXT DAT
[7]
Bernstein P.A., 1987, Concurrency Control and Recovery in Database Systems
[9]
ELIOT J, 1985, NESTED T APPROC RELI
[10]
Garcia-Molina H., 1987, P ACM SIGMOD INT C M, P249, DOI DOI 10.1145/38714.38742