Security Constraint Processing During the Update Operation

Cached

Download Links

by Marie Collins , William Ford , Bhavani Thuraisingham
Venue:in a MLS DBMS. Proc. 7th Annual Computer Security Applications Conf. (ACSAC'91). IEEE Computer
Citations:2 - 0 self