共 12 条
[1]
AMMANN P, 1998, J COMPUTER SECURITY, V6
[2]
AMMANN P, 1992, DATABASE SECURITY, V2, P23
[3]
BEERI C, 1989, J ACM, V36
[5]
ELMAGARMID AK, 1992, DATABASE T MODELS AD
[6]
Jajodia S., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P216, DOI 10.1109/RISP.1992.213259
[7]
Keefe T. F., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P369, DOI 10.1109/RISP.1990.63865
[8]
Maimone W. T., 1990, Proceedings of the Sixth Annual Computer Security Applications Conference (Cat. No.90TH0351-7), P137, DOI 10.1109/CSAC.1990.143762
[9]
MCDERMOTT J, 1992, P 6 IFIP WG 11 3 WOR
[10]
PANOS K, 1990, P ACM SIGMOD INT C M, P194