Author:
Nguyễn Phước Bảo Hoàng,Clavel Manuel
Publisher
Springer International Publishing
Reference15 articles.
1. Basin, D.A., Clavel, M., Egea, M.: A decade of model-driven security. In: Breu, R., Crampton, J., Lobo, J.(eds.) Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, 15–17 June 2011, pp. 1–10. ACM (2011)
2. Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39–91 (2006)
3. Browder, K., Davidson, M.A.: The virtual private database in Oracle9iR2. Technical report, Oracle Corporation (2002). https://www.cgisecurity.com/-database/oracle/pdf/VPD9ir2twp.pdf
4. Row and column access control support in IBM DB2 for i. Technical report, International Business Machines Corporation (2014)
5. Lecture Notes in Computer Science;B Demuth,2001