-
3
-
-
0026222370
-
On Rigorous Transaction Scheduling
-
Sep, CrossRefGoogle Scholar
-
Y. Breitbart, D. Georgakopoulos, M. Rusinkiewicz, and A. Silberschatz, “On Rigorous Transaction Scheduling,” IEEE Transaction on Software Engineering, Vol. 17, No. 9, Sep. 1991, pp. 954-960. CrossRefGoogle Scholar
-
(1991)
IEEE Transaction on Software Engineering
, vol.17
, Issue.9
, pp. 954-960
-
-
Breitbart, Y.1
Georgakopoulos, D.2
Rusinkiewicz, M.3
Silberschatz, A.4
-
4
-
-
84941430565
-
Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture
-
Shepherdstown, WV, Nov
-
Oliver Costich, “Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture,” IFIP WG 11.3, Fifth Working Conference On Database Security, Shepherdstown, WV, Nov. 1991.
-
(1991)
IFIP WG 11.3, Fifth Working Conference on Database Security
-
-
Costich, O.1
-
6
-
-
84941516648
-
Effects of Automomy on Maintaining Global Serializability in Heterogeneous Database System
-
Gaithersburg, MD, Oct
-
W. Du, A.K. Elmagarmid, Y. Leu and S.D. Ostermann, “Effects of Automomy on Maintaining Global Serializability in Heterogeneous Database System,” Proceedings of 2nd Interntional Conference on Data and Knowledge Systems for Manufacturing and Engineering, Gaithersburg, MD, Oct. 1989.
-
(1989)
Proceedings of 2Nd Interntional Conference on Data and Knowledge Systems for Manufacturing and Engineering
-
-
Du, W.1
Elmagarmid, A.K.2
Leu, Y.3
Ostermann, S.D.4
-
7
-
-
1642304751
-
Achieving a Trusted Datbase Management System using Parallelism
-
ed. Carl Landwehr, North-Holland
-
Judith N. Froscher and Catherine Meadows, “Achieving a Trusted Datbase Management System using Parallelism,” Database Security II: Status and Prospects, ed. Carl Landwehr, pp. 151-160, North-Holland, 1989.
-
(1989)
Database Security II: Status and Prospects
, pp. 151-160
-
-
Froscher, J.N.1
Meadows, C.2
-
9
-
-
0025137221
-
Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture
-
Oakland, CA, May
-
Sushil Jajodia and Boris Kogan, “Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture,” Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1990, pp. 360-368.
-
(1990)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 360-368
-
-
Jajodia, S.1
Kogan, B.2
-
10
-
-
85029511407
-
Recovery Management for Multilevel Secure Database Systems
-
Vancouver, British Columbia, Aug
-
I. E. Kang and T. F. Keefe, “Recovery Management for Multilevel Secure Database Systems,” IFIP WG 11.3, Sixth Working Conference on Database Security, Vancouver, British Columbia, Aug. 1992, pp. 227-252.
-
(1992)
IFIP WG 11.3, Sixth Working Conference on Database Security
, pp. 227-252
-
-
Kang, I.E.1
Keefe, T.F.2
-
13
-
-
84898086614
-
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System
-
Vancouver, British Columbia, Aug
-
M. Kang, J. N. Froscher and O. Costich, “A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System,” IFIP WG 11.3, Sixth Working Conference On Database Security, Vancouver, British Columbia, Aug. 1992, pp. 289-310.
-
(1992)
IFIP WG 11.3, Sixth Working Conference on Database Security
, pp. 289-310
-
-
Kang, M.1
Froscher, J.N.2
Costich, O.3
-
14
-
-
0025442003
-
The Sea View Security Model
-
June, CrossRefGoogle Scholar
-
T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman and W.R. Shockley, “The Sea View Security Model,” IEEE Transactions on Software Engineering, Vol. 16, No. 6, June 1990, pp. 593-607. CrossRefGoogle Scholar
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
16
-
-
0025447566
-
Design of LDV: A Multilevel Secure Relational Database Management System
-
June
-
Paul D. Stachour and Bhavani Thuraisingham, “Design of LDV: A Multilevel Secure Relational Database Management System,” IEEE Transactions on Knowledge and Data Engineering, Vol. 2, No. 2, June 1990, pp. 190-209.
-
(1990)
IEEE Transactions on Knowledge and Data Engineering
, vol.2
, Issue.2
, pp. 190-209
-
-
Stachour, P.D.1
Thuraisingham, B.2
|