共 50 条
- [1] Modeling and Enforcing Integrity Constraints on Graph Databases [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT I, 2020, 12391 : 269 - 284
- [2] Enforcing Request Integrity in Web Applications [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 225 - 240
- [3] Enforcing Constraints on Life Cycles of Business Artifacts [J]. THIRD INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2009, : 111 - +
- [4] LogicFence: A framework for enforcing global integrity constraints at runtimei [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 97 - 104
- [5] SIF: Enforcing confidentiality and integrity in web applications [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 1 - 16
- [6] Enforcing Usage Constraints on Credentials for Web Applications [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 112 - 125
- [10] Securing software by enforcing data-flow integrity [J]. Usenix Association 7th Usenix Symposium on Operating Systems Design and Implementation, 2006, : 147 - 160