Computer Science ›› 2007, Vol. 34 ›› Issue (2): 122-124.
Previous Articles Next Articles
ZHANG Xiao ,WANG Shan ,PENG Zhao-Hui (School of Information, Renmin University of China, Beijing 100872)
Online:
Published:
Abstract: Preventing unauthorized access is always one of the main issues to database security, however, internal administrator becomes one threat more and more while facilities like firewall are maturing and widely laid out. A security-policy-based method and its
Key words: Security policy, Security label, Query optimization
ZHANG Xiao ,WANG Shan ,PENG Zhao-Hui (School of Information, Renmin University of China, Beijing 100872). [J].Computer Science, 2007, 34(2): 122-124.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I2/122
Cited