標(biāo)題: Titlebook: Database Security IX; Status and prospects David L. Spooner,Steven A. Demurjian,John E. Dobso Book 1996 IFIP International Federation for I [打印本頁] 作者: ACID 時(shí)間: 2025-3-21 19:23
書目名稱Database Security IX影響因子(影響力)
書目名稱Database Security IX影響因子(影響力)學(xué)科排名
書目名稱Database Security IX網(wǎng)絡(luò)公開度
書目名稱Database Security IX網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Database Security IX被引頻次
書目名稱Database Security IX被引頻次學(xué)科排名
書目名稱Database Security IX年度引用
書目名稱Database Security IX年度引用學(xué)科排名
書目名稱Database Security IX讀者反饋
書目名稱Database Security IX讀者反饋學(xué)科排名
作者: 過多 時(shí)間: 2025-3-21 21:51 作者: conformity 時(shí)間: 2025-3-22 02:56
https://doi.org/10.1007/978-3-030-19254-9degree of site autonomy. The proposed implementation strategy assumes that a federal security policy specifies the security aspects that apply to all sites of the federation. Each site is then able to extend the security policy that applies to data owned by it with its own site security policy. The 作者: inchoate 時(shí)間: 2025-3-22 05:53 作者: B-cell 時(shí)間: 2025-3-22 12:05 作者: overshadow 時(shí)間: 2025-3-22 13:36 作者: overshadow 時(shí)間: 2025-3-22 20:44 作者: Fabric 時(shí)間: 2025-3-22 21:33 作者: Commemorate 時(shí)間: 2025-3-23 02:20
Conservation of Tropical Plant Species application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information作者: 低位的人或事 時(shí)間: 2025-3-23 06:55
Conserving Tropical Leguminous Food Cropsable such downgrading to be specified and managed. In this paper, we propose a general language to cope with this problem. This language is based on first order logic with various extensions to represent concepts such as dating, classification and downgrading. This language enables the content of a 作者: Inferior 時(shí)間: 2025-3-23 11:36 作者: 黃油沒有 時(shí)間: 2025-3-23 15:42
https://doi.org/10.1007/978-3-030-98233-1rty. It executes read downs on an old database snapshot; transactions accessing objects at their own level manipulate the most recently committed database, and are synchronized using weak and strong locks, somewhat like strict 2PL. At regular intervals, known as the version period, the old snapshot 作者: 思想靈活 時(shí)間: 2025-3-23 21:24 作者: 弄臟 時(shí)間: 2025-3-24 01:48 作者: 發(fā)牢騷 時(shí)間: 2025-3-24 02:46 作者: 牌帶來 時(shí)間: 2025-3-24 06:31
https://doi.org/10.1007/978-0-387-34932-9access control; concurrency; data mining; database; database systems作者: 弓箭 時(shí)間: 2025-3-24 12:55
IFIP International Federation for Information Processing 1996作者: 使混合 時(shí)間: 2025-3-24 18:20
Database Security IX978-0-387-34932-9Series ISSN 1868-4238 Series E-ISSN 1868-422X 作者: Substitution 時(shí)間: 2025-3-24 19:38 作者: 機(jī)警 時(shí)間: 2025-3-25 00:21
Future: Integrated International Policiesem in database systems is our motivation. We introduce a new queueing theoretic model, the MIMO model, that incorporates burstiness in the sending side and busy periods in the receiving side. Based on simulation results derived from this model, we show that the buffer requirements from M/M/1/N queues are too optimistic.作者: Indigence 時(shí)間: 2025-3-25 04:30
The Future and Electronic Data Processingity, client/server object database management system as an extension of the existing commercial ONTOS product. TOP will provide features and assurances comparable to those defined for the B1 level of the US TCSEC.作者: Overthrow 時(shí)間: 2025-3-25 07:38 作者: Polydipsia 時(shí)間: 2025-3-25 11:44 作者: 暗指 時(shí)間: 2025-3-25 19:32 作者: Infusion 時(shí)間: 2025-3-25 22:42
How Secure is Secure: Some Thoughts on Security Metricsue of analyzing a security-critical information system in order to determine if the system is considered secure enough. The central idea of the remarks is to introduce the idea of a relative secure system that has an appropriate performance level of security fault tolerance or fault acceptance as sp作者: BIPED 時(shí)間: 2025-3-26 02:27
Messages, Communication, Information Security: Protecting the User from the Datad characteristics including security breaches, privacy violations, errors being inserted into databases, and the like. We illustrate our approach by means of a case study involving communicating public administrations which we have been studying. We outline a number of options for constructing solut作者: Epithelium 時(shí)間: 2025-3-26 07:57 作者: Rankle 時(shí)間: 2025-3-26 11:03 作者: Feckless 時(shí)間: 2025-3-26 16:05
The Modulated-Input Modulated-Output Modelem in database systems is our motivation. We introduce a new queueing theoretic model, the MIMO model, that incorporates burstiness in the sending side and busy periods in the receiving side. Based on simulation results derived from this model, we show that the buffer requirements from M/M/1/N queue作者: 陶醉 時(shí)間: 2025-3-26 19:43 作者: photopsia 時(shí)間: 2025-3-26 21:55 作者: backdrop 時(shí)間: 2025-3-27 04:49 作者: 彎曲的人 時(shí)間: 2025-3-27 06:29
Modeling Mandatory Access Control in Role-Based Security Systems application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information作者: Heretical 時(shí)間: 2025-3-27 13:07 作者: paleolithic 時(shí)間: 2025-3-27 15:28 作者: 光亮 時(shí)間: 2025-3-27 19:43
A Locking Protocol for MLS Databases Providing Support For Long Transactionsrty. It executes read downs on an old database snapshot; transactions accessing objects at their own level manipulate the most recently committed database, and are synchronized using weak and strong locks, somewhat like strict 2PL. At regular intervals, known as the version period, the old snapshot 作者: 關(guān)節(jié)炎 時(shí)間: 2025-3-28 00:27 作者: Jejune 時(shí)間: 2025-3-28 05:10
A secure concurrency control protocol for real-time databases Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditions using a primary copy and a secondary copy for each作者: 千篇一律 時(shí)間: 2025-3-28 07:00 作者: 伸展 時(shí)間: 2025-3-28 11:57 作者: BIPED 時(shí)間: 2025-3-28 17:23 作者: 冥想后 時(shí)間: 2025-3-28 21:32 作者: 除草劑 時(shí)間: 2025-3-28 22:54 作者: 歌劇等 時(shí)間: 2025-3-29 03:13
A formal specification of an authorization model for object-oriented databasesway, each new access rule can be tested for compliance with the requirement of maintaining a secure system. The use of implicit access rules (i.e., rules derived from others using data associations) makes this security model unique, and its representation in a formal model is of interest.作者: inconceivable 時(shí)間: 2025-3-29 09:37 作者: 外貌 時(shí)間: 2025-3-29 13:58 作者: pulmonary-edema 時(shí)間: 2025-3-29 19:29 作者: Albumin 時(shí)間: 2025-3-29 22:16
Conserving Tropical Leguminous Food Cropstemporal multilevel database to be specified. We also show that this language can be used to specify general and various downgrading rules. We conclude this paper by providing several examples of downgrading rules in the context of the entity-relationship model.作者: 財(cái)主 時(shí)間: 2025-3-29 23:59 作者: Pseudoephedrine 時(shí)間: 2025-3-30 04:33 作者: Aspiration 時(shí)間: 2025-3-30 08:14 作者: Handedness 時(shí)間: 2025-3-30 13:45 作者: breadth 時(shí)間: 2025-3-30 18:40 作者: glacial 時(shí)間: 2025-3-31 00:47
Conservation of Threatened Plantssecurity. The work presented in this paper details three approaches for enforcement mechanisms for object-oriented systems, and evaluates them in the context of a set of goals. We believe that the approaches and results presented herein are relevant to object-oriented systems.