-
1
-
-
0022182726
-
Integrated concurrency control and recovery mechanisms: Design and performance evaluation
-
Agrawal, R. and Dewitt, D.J. (1985). Integrated concurrency control and recovery mechanisms: design and performance evaluation. ACM Transactions on Database Systems, 10, 529-564.
-
(1985)
ACM Transactions on Database Systems
, vol.10
, pp. 529-564
-
-
Agrawal, R.1
Dewitt, D.J.2
-
2
-
-
0027710821
-
High assurance discretionary access control for object bases
-
Bertino, E., Samarati, P., and Jajodia, S. (1993). High assurance discretionary access control for object bases. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 140-150.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security
, pp. 140-150
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
4
-
-
0028444938
-
RAID: High-performance, reliable secondary storage
-
Chen, P.M., Lee, E.K., Gibson, G.A., Katz, R.H., and Patterson, D.A. (1994). RAID: high-performance, reliable secondary storage. ACM Computing Surveys, 26, 145-185.
-
(1994)
ACM Computing Surveys
, vol.26
, pp. 145-185
-
-
Chen, P.M.1
Lee, E.K.2
Gibson, G.A.3
Katz, R.H.4
Patterson, D.A.5
-
7
-
-
0141911037
-
-
Norwood, MA: Artech House
-
Ferraiolo, D.F., Kuhn, D.R., and Chandramouli, R. (2003). Role-Based Access Control. Norwood, MA: Artech House.
-
(2003)
Role-Based Access Control
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
12
-
-
0019608720
-
Formal models for computer security
-
Landwehr, C.E. Formal models for computer security. Computing Surveys, 13, 247-278.
-
Computing Surveys
, vol.13
, pp. 247-278
-
-
Landwehr, C.E.1
-
13
-
-
85178603065
-
WLAN security update
-
5th ed, M. Krause and H. Tipton (Eds.), Boca Raton, FL: Auerbach
-
Majstor, F. (2005). WLAN security update. In Handbook of Information Security Management, 5th ed., Vol. 2, M. Krause and H. Tipton (Eds.). Boca Raton, FL: Auerbach, pp. 379-392.
-
(2005)
Handbook of Information Security Management
, vol.2
, pp. 379-392
-
-
Majstor, F.1
-
14
-
-
85178596706
-
Security patch management 101: It just makes good sense!
-
5th ed, M. Krause and H. Tipton (Eds.)., Boca Raton, FL: Auerbach
-
McGhie, L. (2005). Security patch management 101: it just makes good sense! In Handbook of Information Security Management, 5th ed., Vol. 2, M. Krause and H. Tipton (Eds.). Boca Raton, FL: Auerbach, pp. 405-409.
-
(2005)
Handbook of Information Security Management
, vol.2
, pp. 405-409
-
-
McGhie, L.1
-
16
-
-
24844451666
-
-
Special Publication, National Institute of Standards and Technology
-
Swanson, M., Grance, T., Hash, J., Pope, L., Thomas, R., and Whol, A. (2001). Contingency Planning Guide for Information Technology Systems, Special Publication 800-834. National Institute of Standards and Technology.
-
(2001)
Contingency Planning Guide for Information Technology Systems
, pp. 800-834
-
-
Swanson, M.1
Grance, T.2
Hash, J.3
Pope, L.4
Thomas, R.5
Whol, A.6
|