메뉴 건너뛰기




Volumn , Issue , 1998, Pages 73-82

Application-level isolation to cope with malicious database users

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; SECURITY SYSTEMS;

EID: 84944777782     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.1998.738580     Document Type: Conference Paper
Times cited : (13)

References (10)
  • 4
    • 0021496873 scopus 로고
    • Optimism and consistency in partitioned distributed database systems
    • September
    • S. B. Davidson. Optimism and consistency in partitioned distributed database systems. ACM Transactions on Database Systems, 9(3):456-581, September 1984.
    • (1984) ACM Transactions on Database Systems , vol.9 , Issue.3 , pp. 456-581
    • Davidson, S.B.1
  • 6
    • 0001909598 scopus 로고
    • Finding all the elementary circuits of a directed graph
    • D. Johnson. Finding all the elementary circuits of a directed graph. SIAM J. Comput., (4):77-84, 1975.
    • (1975) SIAM J. Comput. , vol.4 , pp. 77-84
    • Johnson, D.1
  • 7
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • June
    • T. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12(4):405-418, June 1993.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.1
  • 8
    • 0002538948 scopus 로고    scopus 로고
    • Storage jamming
    • D. Spooner, S. Demurjian, and J. Dobson, editors, Chapman & Hall, London
    • J. McDermott and D. Goldschlag. Storage jamming. In D. Spooner, S. Demurjian, and J. Dobson, editors, Database Security IX: Status and Prospects, pages 365-381. Chapman & Hall, London, 1996.
    • (1996) Database Security IX: Status and Prospects , pp. 365-381
    • McDermott, J.1    Goldschlag, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.