Computer Science ›› 2013, Vol. 40 ›› Issue (6): 90-93.
Previous Articles Next Articles
LI Ling,QIN Xiao-lin and DAI Hua
[1] Bertino E,Sandhu R.Database security-concepts,approaches,and challenges [J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):2-19 [2] 刘启原,刘怡.数据库与信息系统的安全 [M].北京:科学出版社,2000 [3] 张敏,徐震,冯登国.数据库安全 [M].北京:科学出版社,2005 [4] Knight J C,Sullivan K J,Elder M C,et al.Survivability architectures:Issues and approaches [C]∥ DARPA Information Survivability Conference and Exposition,2000DISCEX ’00Proceedings.2000:157-171 [5] Ammann P,Jajodia S,McCollum C D,et al.Surviving information warfare attacks on databases [C]∥Security and Privacy,1997Proceedings of IEEE Symposium on.1997:164-174 [6] Bai K,Liu P.A data damage tracking quarantine and recovery(DTQR) scheme for mission-critical database systems [C]∥Proceedings of the 12th International Conference on Extending Database Technology:Advances in Database Technology.ACM,Saint Petersburg,Russia,2009:720-731 [7] Bai K,Yu M,Liu P.Trace:Zero-down-time database damagetracking,quarantine,and cleansing with negligible run-time overhead [C]∥Proceedings of the 13th European Symposium on Research in Computer Security:Computer Security.Springer-Verlag,Málaga,Spain,2008:161-176 [8] Liu P,Jajodia S.Multi-phase damage confinement in databasesystems for intrusion tolerance [C]∥Computer Security Foundations Workshop,2001.Proceedings.14th IEEE,2001:191-205 [9] Bai K,Liu P.Towards database firewall:Mining the damagespreading patterns [C]∥Computer Security Applications Conference,ACSAC ’0622nd Annual.2006:449-462 [10] 戴华,秦小麟,郑吉平.基于CTMO模型的数据库损坏数据隔离技术 [J].计算机学报,2011,34(2):275-290 [11] 谢美意,朱虹,冯玉才,等.自修复数据库系统设计实现关键问题研究 [J].小型微型计算机系统,2010(10):1926-1930 [12] 付戈,时杰,李专,等.一种有效的受损数据隔离方法 [J].计算机科学与探索,2010(8):712-722 [13] Dai H,Qin X,Zheng G,et al.SQRM:An Effective Solution to Suspicious Users in Database[C]∥Processding of 3rd International Conference on Advances in Databases,Knowledge,and Data Applications.2011:59-64 |
No related articles found! |
|