共 50 条
- [41] Object Normal Form, Fourth Normal Form and Their Application to Database Security [J]. CONCEPTUAL MODELING (ER 2022), 2022, 13607 : 349 - 364
- [42] Inter-network access to database based on database security proxy [J]. Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2010, 34 (09): : 103 - 105
- [45] Research on the Security Based on Web Database [J]. PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, MACHINERY AND ENERGY ENGINEERING (MSMEE 2017), 2017, 123 : 115 - 119
- [46] Implementing security on a prototype hospital database [J]. MEDICAL INFORMATICS EUROPE '97: PARTS A & B, 1997, 43 : 176 - 180
- [47] A Formal Multilevel Database Security Model [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 815 - +
- [48] A new comparative study of database security [J]. ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2023, 33 (03): : 17 - 28
- [49] Security Workflow Model for Database Storage [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2017), 2017, 74 : 288 - 293
- [50] A security specification library with a schemaless database [J]. COMPUTATIONAL SCIENCE - ICCS 2007, PT 3, PROCEEDINGS, 2007, 4489 : 890 - +