Computer Science ›› 2005, Vol. 32 ›› Issue (12): 83-87.
Previous Articles Next Articles
Online:
Published:
Abstract: There is limitation on the traditional user identification and access control of database security mechanism, such as to the illegal actions of SOL injection, disassembly with error messages, misusing authorization. The paper presents an access control mo
Key words: Access control, Template, Database security, Security model
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2005/V32/I12/83
Cited