共 15 条
[1]
Agrawal R., Kiernan J., Srikant R., Xu Y., Hippocratic databases, Proc. of 28th VLDB Conference, (2002)
[2]
Baader F., Brandt S., Lutz C., Pushing the εL envelope, IJCAI-05, Proceedings, pp. 364-369, (2005)
[3]
Biskup J., Bonatti P.A., Controlled query evaluation for enforcing confidentiality in complete information systems, Int. J. Inf. Secur., 3, 1, pp. 14-27, (2004)
[4]
Biskup J., Bonatti P.A., Controlled query evaluation for known policies by combining lying and refusal, Ann. Math. Artif. Intell., 40, 1-2, pp. 37-62, (2004)
[5]
Biskup J., Bonatti P.A., Controlled query evaluation with open queries for a decidable relational submodel, Ann. Math. Artif. Intell., 50, 1-2, pp. 39-77, (2007)
[6]
Biskup J., Weibert T., Keeping secrets in incomplete databases, Int. J. Inf. Sec., 7, 3, (2008)
[7]
Biskup J., Wiese L., Preprocessing for controlled query evaluation with availability policy, J. Comput. Secur., 16, 4, pp. 477-494, (2008)
[8]
Bonatti P.A., Kraus S., Subrahmanian V.S., Foundations of secure deductive databases, Trans. Knowl. Data Eng., 7, 3, pp. 406-422, (1995)
[9]
Bovet D.P., Crescenzi P., Introduction to the theory of complexity, (1994)
[10]
Calvanese D., Giacomo G., Lembo D., Lenzerini M., Rosati R., Tractable reasoning and efficient query answering in description logics: The DL-Lite family, J. Autom. Reason., 39, 3, pp. 385-429, (2007)