Intrusion confinement by isolation in information systems. lFlPWorkingCot*ference on Database Security (1999)

by SushilJajodia PengLiu, Catherine D McCollum