包裹 发表于 2025-3-23 13:45:34

Politikwissenschaftliche Paperbacksage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.

浅滩 发表于 2025-3-23 16:38:48

http://reply.papertrans.cn/27/2634/263384/263384_12.png

ALLEY 发表于 2025-3-23 22:03:58

Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databasesage transferred in the system. This paper uses a compile-time approach and presents algorithms for flow control which are applied at Rule-administration and Compile times, thus saving considerable runtime overhead. Special emphasis is put on the Flow-analysis of Methods and the transactions invoking them.

就职 发表于 2025-3-23 23:13:51

https://doi.org/10.1057/9780333982785 through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsibilities in n-tiered architectures and in decoupled data management components, security-awareness of applications, and assurance.

消极词汇 发表于 2025-3-24 04:17:32

https://doi.org/10.1007/978-3-663-09508-8model a variety of authorization policies. The architecture described is integrated at the meta-object level of the Meta-Object Operating System Environment, providing a common foundation for access control in heterogeneous object models.

浮雕 发表于 2025-3-24 10:31:37

http://reply.papertrans.cn/27/2634/263384/263384_16.png

手铐 发表于 2025-3-24 11:58:29

Distributed object technologies, databases, and security and security. Data management can be implemented either through distributed object interfaces added to a conventional database system architecture or through decoupled, distributed components that coordinate to provide database capabilities. Key security issues include security context and responsi

reserve 发表于 2025-3-24 15:04:26

http://reply.papertrans.cn/27/2634/263384/263384_18.png

ciliary-body 发表于 2025-3-24 22:03:58

Web implementation of a security mediator for medical databasese some of their protected information, tools are being developed to facilitate the information transfer while protecting the privacy of the data. To this end, under the TIHI project, we have designed a . a software entity that screens both incoming queries and outgoing results for compliance with a

污秽 发表于 2025-3-25 01:34:30

Supporting the requirements for multi-level secure and real-time databases in distributed environmense to have partial security in order to improve on real-time performance when necessary. By our definition, systems that are partially secure allow security violations between only certain levels. We present the ideas behind a specification language that allows database designers to specify importan
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Database Security XI; Status and Prospects T. Y. Lin,Shelly Qian Book 1998 IFIP International Federation for Information Processing 1998 Ac