photopsia 发表于 2025-3-26 21:55:51

http://reply.papertrans.cn/27/2634/263383/263383_31.png

backdrop 发表于 2025-3-27 04:49:47

http://reply.papertrans.cn/27/2634/263383/263383_32.png

弯曲的人 发表于 2025-3-27 06:29:41

Modeling Mandatory Access Control in Role-Based Security Systems application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information

Heretical 发表于 2025-3-27 13:07:55

http://reply.papertrans.cn/27/2634/263383/263383_34.png

paleolithic 发表于 2025-3-27 15:28:27

http://reply.papertrans.cn/27/2634/263383/263383_35.png

光亮 发表于 2025-3-27 19:43:47

A Locking Protocol for MLS Databases Providing Support For Long Transactionsrty. It executes read downs on an old database snapshot; transactions accessing objects at their own level manipulate the most recently committed database, and are synchronized using weak and strong locks, somewhat like strict 2PL. At regular intervals, known as the version period, the old snapshot

关节炎 发表于 2025-3-28 00:27:10

http://reply.papertrans.cn/27/2634/263383/263383_37.png

Jejune 发表于 2025-3-28 05:10:34

A secure concurrency control protocol for real-time databases Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditions using a primary copy and a secondary copy for each

千篇一律 发表于 2025-3-28 07:00:21

http://reply.papertrans.cn/27/2634/263383/263383_39.png

伸展 发表于 2025-3-28 11:57:09

http://reply.papertrans.cn/27/2634/263383/263383_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Database Security IX; Status and prospects David L. Spooner,Steven A. Demurjian,John E. Dobso Book 1996 IFIP International Federation for I