找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Database Security XI; Status and Prospects T. Y. Lin,Shelly Qian Book 1998 IFIP International Federation for Information Processing 1998 Ac

[復(fù)制鏈接]
樓主: 時(shí)間
11#
發(fā)表于 2025-3-23 13:45:34 | 只看該作者
Politikwissenschaftliche Paperbacksage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.
12#
發(fā)表于 2025-3-23 16:38:48 | 只看該作者
13#
發(fā)表于 2025-3-23 22:03:58 | 只看該作者
Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databasesage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.
14#
發(fā)表于 2025-3-23 23:13:51 | 只看該作者
https://doi.org/10.1057/9780333982785 through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsibilities in n-tiered architectures and in decoupled data management components, security-awareness of applications, and assurance.
15#
發(fā)表于 2025-3-24 04:17:32 | 只看該作者
https://doi.org/10.1007/978-3-663-09508-8model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Environment, providing a common foundation for access control in heterogeneous object models.
16#
發(fā)表于 2025-3-24 10:31:37 | 只看該作者
17#
發(fā)表于 2025-3-24 11:58:29 | 只看該作者
Distributed object technologies, databases, and security and security. Data management can be implemented either through distributed object interfaces added to a conventional database system architecture or through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsi
18#
發(fā)表于 2025-3-24 15:04:26 | 只看該作者
19#
發(fā)表于 2025-3-24 22:03:58 | 只看該作者
Web implementation of a security mediator for medical databasese some of their protected information, tools are being developed to facilitate the information transfer while protecting the privacy of the data. To this end, under the TIHI project, we have designed a . a software entity that screens both incoming queries and outgoing results for compliance with a
20#
發(fā)表于 2025-3-25 01:34:30 | 只看該作者
Supporting the requirements for multi-level secure and real-time databases in distributed environmense to have partial security in order to improve on real-time performance when necessary. By our definition, systems that are partially secure allow security violations between only certain levels. We present the ideas behind a specification language that allows database designers to specify importan
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-28 22:42
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
天气| 郴州市| 中宁县| 汾西县| 桂平市| 渭源县| 布尔津县| 利辛县| 景东| 梁平县| 通山县| 永平县| 汝阳县| 荆州市| 洛宁县| 武陟县| 边坝县| 安徽省| 广宗县| 绵竹市| 右玉县| 夏邑县| 曲阳县| 东明县| 孟州市| 贵州省| 周口市| 年辖:市辖区| 五华县| 荔波县| 托里县| 库伦旗| 安远县| 措勤县| 望都县| 仁布县| 普兰店市| 铜川市| 托里县| 灌阳县| 苍溪县|