Security Constraint Processing During the Update Operation (0)

by M Collins, W Ford, B Thuraisingham
Venue:in a MLS DBMS. Proc. 7th Annual Computer Security Applications Conf. (ACSAC'91). IEEE Computer