找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Database Security XI; Status and Prospects T. Y. Lin,Shelly Qian Book 1998 IFIP International Federation for Information Processing 1998 Ac

[復制鏈接]
樓主: 時間
41#
發(fā)表于 2025-3-28 18:01:43 | 只看該作者
https://doi.org/10.1007/978-3-663-09508-8ommon foundation for access control in object-oriented systems. This paper presents a primitive capability-based access control architecture that can model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Envir
42#
發(fā)表于 2025-3-28 19:44:41 | 只看該作者
Daniel Lindmark,Erik J. Anderssonctivities (or tasks) in a workflow, task dependencies are specified among them. In a multilevel secure (MLS) workflow, tasks may belong to different security levels. Ensuring the task dependencies from the tasks at higher security levels to those at lower security level (high-to-low dependencies) ma
43#
發(fā)表于 2025-3-28 23:48:42 | 只看該作者
44#
發(fā)表于 2025-3-29 06:07:02 | 只看該作者
Stefan Gelfgren,Daniel Lindmarkfor security. Firstly, since the description of a workflow process explicitly states when which function is to be performed by . security specifications may be automatically derived from such descriptions. Secondly, the derived security specifications have to be enforced. This paper considers these
45#
發(fā)表于 2025-3-29 09:10:37 | 只看該作者
Women in the Political Backgrounde and reducing the storage required for indexing. At the bottom tier, our scheme requires separate single-level indices, one for each partition of the multilevel relation; at the top tier, our scheme requires a . multilevel index consisting of only those key values from the single-level indices that
46#
發(fā)表于 2025-3-29 14:36:52 | 只看該作者
https://doi.org/10.1007/978-3-031-51205-6n the form of a deadline and is represented by a priority to be used by schedulers. In many real-time applications, security is another important requirement, since the system maintains sensitive information to be shared by multiple users with different levels of security clearance. As more advanced
47#
發(fā)表于 2025-3-29 18:16:31 | 只看該作者
48#
發(fā)表于 2025-3-29 20:30:02 | 只看該作者
https://doi.org/10.1007/978-3-663-09508-8ODBMSs). The guidelines are formally stated as security principles. We also show how to design a garbage collection mechanism in a multilevel secure ODBMS that ensures both security and referential integrity.
49#
發(fā)表于 2025-3-30 02:45:46 | 只看該作者
Book 1998This book aims to discuss in depth the current state ofresearch and practice in database security. It documents progress andprovidesresearchers and students with a broad perspective of recentdevelopments in what is recognised as a key topic in business and inthe public sector.
50#
發(fā)表于 2025-3-30 05:55:29 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-29 01:30
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
安化县| 静乐县| 丰台区| 扎赉特旗| 德清县| 花垣县| 六枝特区| 洪湖市| 双流县| 余干县| 通江县| 永登县| 济宁市| 平定县| 邻水| 新郑市| 扶余县| 罗定市| 翁牛特旗| 长顺县| 栖霞市| 收藏| 郯城县| 香河县| 揭阳市| 波密县| 望都县| 华阴市| 武义县| 滁州市| 盐边县| 南丰县| 甘洛县| 灵山县| 新竹县| 修文县| 甘南县| 都昌县| 镇巴县| 皋兰县| 民乐县|