photopsia
发表于 2025-3-26 21:55:51
http://reply.papertrans.cn/27/2634/263383/263383_31.png
backdrop
发表于 2025-3-27 04:49:47
http://reply.papertrans.cn/27/2634/263383/263383_32.png
弯曲的人
发表于 2025-3-27 06:29:41
Modeling Mandatory Access Control in Role-Based Security Systems application in security and the basics of the concept of mandatory access control, we develop a scheme of role-based protection that realizes mandatory access control. The basis of this formulation develops from the recognition that roles can be seen as facilitating access to some given information
Heretical
发表于 2025-3-27 13:07:55
http://reply.papertrans.cn/27/2634/263383/263383_34.png
paleolithic
发表于 2025-3-27 15:28:27
http://reply.papertrans.cn/27/2634/263383/263383_35.png
光亮
发表于 2025-3-27 19:43:47
A Locking Protocol for MLS Databases Providing Support For Long Transactionsrty. It executes read downs on an old database snapshot; transactions accessing objects at their own level manipulate the most recently committed database, and are synchronized using weak and strong locks, somewhat like strict 2PL. At regular intervals, known as the version period, the old snapshot
关节炎
发表于 2025-3-28 00:27:10
http://reply.papertrans.cn/27/2634/263383/263383_37.png
Jejune
发表于 2025-3-28 05:10:34
A secure concurrency control protocol for real-time databases Multilevel security requirements introduce a new dimension to transaction processing in real-time database systems. In this paper, we propose a novel concurrency control protocol that can meet the real-time, security, and serializability conditions using a primary copy and a secondary copy for each
千篇一律
发表于 2025-3-28 07:00:21
http://reply.papertrans.cn/27/2634/263383/263383_39.png
伸展
发表于 2025-3-28 11:57:09
http://reply.papertrans.cn/27/2634/263383/263383_40.png