共 16 条
- [1] Anciaux N., 2007, P 2007 ACM SIGMOD IN, P677
- [2] Canim M, 2009, LECT NOTES COMPUT SC, V5776, P1, DOI 10.1007/978-3-642-04219-5_1
- [3] Chow Jim, 2005, USENIX SECURITY S, P22
- [4] Gaudin S., SECURITY BREACHES CO
- [5] Haber S., 1991, J CRYPTOLOGY, V3, P99
- [7] Iyer B., 2004, INT C EXT DAT TECHN
- [8] Ngatchou P, 2005, P 13 INT C INT SYST, P84, DOI DOI 10.1109/ISAP.2005.1599245
- [9] Forensic Analysis of Database Tampering [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2008, 33 (04):
- [10] Ramakrishnan R., 2003, DATA BASE MANAGEMENT