photopsia 发表于 2025-3-26 21:55:51
http://reply.papertrans.cn/27/2634/263383/263383_31.pngbackdrop 发表于 2025-3-27 04:49:47
http://reply.papertrans.cn/27/2634/263383/263383_32.png弯曲的人 发表于 2025-3-27 06:29:41
Modeling Mandatory Access Control in Role-Based Security Systems application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given informationHeretical 发表于 2025-3-27 13:07:55
http://reply.papertrans.cn/27/2634/263383/263383_34.pngpaleolithic 发表于 2025-3-27 15:28:27
http://reply.papertrans.cn/27/2634/263383/263383_35.png光亮 发表于 2025-3-27 19:43:47
A Locking Protocol for MLS Databases Providing Support For Long Transactionsrty. It executes read downs on an old database snapshot; transactions accessing objects at their own level manipulate the most recently committed database, and are synchronized using weak and strong locks, somewhat like strict 2PL. At regular intervals, known as the version period, the old snapshot关节炎 发表于 2025-3-28 00:27:10
http://reply.papertrans.cn/27/2634/263383/263383_37.pngJejune 发表于 2025-3-28 05:10:34
A secure concurrency control protocol for real-time databases Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditions using a primary copy and a secondary copy for each千篇一律 发表于 2025-3-28 07:00:21
http://reply.papertrans.cn/27/2634/263383/263383_39.png伸展 发表于 2025-3-28 11:57:09
http://reply.papertrans.cn/27/2634/263383/263383_40.png