BIPED 发表于 2025-3-28 17:23:02

http://reply.papertrans.cn/27/2634/263383/263383_41.png

冥想后 发表于 2025-3-28 21:32:04

http://reply.papertrans.cn/27/2634/263383/263383_42.png

除草剂 发表于 2025-3-28 22:54:47

http://reply.papertrans.cn/27/2634/263383/263383_43.png

歌剧等 发表于 2025-3-29 03:13:20

A formal specification of an authorization model for object-oriented databasesway, each new access rule can be tested for compliance with the requirement of maintaining a secure system. The use of implicit access rules (i.e., rules derived from others using data associations) makes this security model unique, and its representation in a formal model is of interest.

inconceivable 发表于 2025-3-29 09:37:14

http://reply.papertrans.cn/27/2634/263383/263383_45.png

外貌 发表于 2025-3-29 13:58:10

http://reply.papertrans.cn/27/2634/263383/263383_46.png

pulmonary-edema 发表于 2025-3-29 19:29:56

http://reply.papertrans.cn/27/2634/263383/263383_47.png

Albumin 发表于 2025-3-29 22:16:44

Conserving Tropical Leguminous Food Cropstemporal multilevel database to be specified. We also show that this language can be used to specify general and various downgrading rules. We conclude this paper by providing several examples of downgrading rules in the context of the entity-relationship model.

财主 发表于 2025-3-29 23:59:11

http://reply.papertrans.cn/27/2634/263383/263383_49.png

Pseudoephedrine 发表于 2025-3-30 04:33:27

http://reply.papertrans.cn/27/2634/263383/263383_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Database Security IX; Status and prospects David L. Spooner,Steven A. Demurjian,John E. Dobso Book 1996 IFIP International Federation for I