Reference32 articles.
1. Andrews GR, Reitman RP (1980) An axiomatic approach to information flow in programs. ACM Trans Program Lang Syst 2(1):56–76
2. Bishop M (2003) Computer security: art and science. Addison-Wesley, Boston
3. Biskup J (2004) Security in computing systems, challenges, approaches and solutions. Springer, Heidelberg
4. Biskup J, Bonatti PA (2004) Controlled query evaluation for enforcing confidentiality in complete information systems. Int J Inf Sec 3(1):14–27
5. Brodsky A, Farkas C, Jajodia S (2000) Secure databases: constraints, inference channels, and monitoring disclosures. IEEE Trans Knowl Data Eng 12(6):900–919
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献