共 50 条
- [1] RBAC policy implementation for SQL databases [J]. DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 288 - 301
- [2] Analyzing RBAC Security Policy of Implementation Using AST [J]. INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2009), 2009, : 215 - 219
- [3] Practical issues with commercial use of federated databases [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, 1996, : 580 - 580
- [4] An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated Databases [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1521 - 1525
- [5] Implementation of federated databases through updatable views [J]. ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 610 - 619
- [6] Conformance checking of RBAC policy and its implementation [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 144 - 155
- [8] A first step towards formal verification of security policy properties for RBAC [J]. QSIC 2004: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2004, : 60 - 67
- [10] Discovering and using entity mappings in federated databases [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1999, 29 (01): : 17 - 42