PANT 发表于 2025-3-27 00:52:05

A Formal Access Control Model for XML DatabasesWe then extend our theory with predicates allowing us to specify the security policy protecting the database. The security policy includes rules addressing the read and write privileges. We propose axioms to derive the database view each user is permitted to see. We also propose axioms to derive the

OPINE 发表于 2025-3-27 04:08:37

http://reply.papertrans.cn/87/8633/863279/863279_32.png

Diaphragm 发表于 2025-3-27 08:59:38

http://reply.papertrans.cn/87/8633/863279/863279_33.png

Contracture 发表于 2025-3-27 13:13:14

http://reply.papertrans.cn/87/8633/863279/863279_34.png

Rustproof 发表于 2025-3-27 16:13:20

http://reply.papertrans.cn/87/8633/863279/863279_35.png

高谈阔论 发表于 2025-3-27 19:44:17

http://reply.papertrans.cn/87/8633/863279/863279_36.png

Anonymous 发表于 2025-3-28 01:27:58

http://reply.papertrans.cn/87/8633/863279/863279_37.png

暂停,间歇 发表于 2025-3-28 02:52:14

http://reply.papertrans.cn/87/8633/863279/863279_38.png

鸣叫 发表于 2025-3-28 07:37:31

XML Security in the Next Generation Optical Disc Contextise services domain. It is widely regarded that XML has the potential of being an interoperable standard for interactive applications in the next generation connected Consumer Electronic devices. A key industry concern in using XML in CE devices is that how basic security requirements pertaining to

Reclaim 发表于 2025-3-28 11:29:46

http://reply.papertrans.cn/87/8633/863279/863279_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Secure Data Management; Second VLDB Workshop Willem Jonker,Milan Petković Conference proceedings 2005 Springer-Verlag Berlin Heidelberg 200