Author:
Go Gwang-Myong,Bu Seok-Jun,Cho Sung-Bae
Publisher
Springer International Publishing
Reference18 articles.
1. Mathew, S., Petropoulos, M., Ngo, H.Q., Upadhyaya, S.J.: A data-centric approach to insider attack detection in database systems. In: Research in Arracks, Intrusions and Defenses, pp. 382–401 (2010)
2. Murray, M.C.: Database security: what students need to know. J. Inf. Technol. Educ. Innov. Pract. 9, 44–61 (2010)
3. Jin, X., Osborn, S.L.: Architecture for data collection in database intrusion detection systems. In: Workshop on Secure Data Management, pp. 96–107 (2007)
4. Bertino, E., Sandhu, R.: Database security: concepts, approaches and challenges. IEEE Trans. Dependable Secure Comput. 2, 2–19 (2005)
5. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, K.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 224–274 (2001)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献