Computer Science ›› 2007, Vol. 34 ›› Issue (2): 122-124.

Previous Articles     Next Articles

ZHANG Xiao ,WANG Shan ,PENG Zhao-Hui (School of Information, Renmin University of China, Beijing 100872)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Preventing unauthorized access is always one of the main issues to database security, however, internal administrator becomes one threat more and more while facilities like firewall are maturing and widely laid out. A security-policy-based method and its

Key words: Security policy, Security label, Query optimization

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!