Publisher
Springer Science and Business Media LLC
Reference15 articles.
1. Basin DA, Clavel M, Egea M. A decade of model-driven security. In: Breu R, Crampton J, Lobo J, editors. 16th ACM symposium on access control models and technologies, SACMAT 2011, Innsbruck, Austria, June 15–17, 2011, Proceedings. ACM; 2011. p. 1–10. https://doi.org/10.1145/1998441.1998443.
2. Basin DA, Doser J, Lodderstedt T. Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol. 2006;15(1):39–91. https://doi.org/10.1145/1125808.1125810.
3. Browder K, Davidson MA. The virtual private database in Oracle9iR2. Tech. rep., Oracle Corporation; 2002. https://www.cgisecurity.com/-database/oracle/pdf/VPD9ir2twp.pdf.
4. Row and column access control support in IBM DB2 for i. Tech. rep. International Business Machines Corporation; 2014. https://www.redbooks.ibm.com/redpapers/pdfs/redp5110.pdf/.
5. Demuth B, Hußmann H, Loecher S. OCL as a specification language for business rules in database applications. In: Gogolla M, Kobryn C, editors. UML, LNCS, vol 2185. Springer; 2001. p. 104–17.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献