Publisher
Morgan & Claypool Publishers LLC
Reference62 articles.
1. R. Agrawal, R. Bayardo, C. Faloutsos, J. Kiernan, R. Rantzau and R. Srikant (2004) Auditing compliance with a hippocratic database. InProc. 30thInt. Conf. on Very Large Data Bases,pages516-527. Cited on page(s) 47, 48, 49, 50
2. D. Agrawal, J. Giles, K. Lee and J. Lobo (2005) Policy ratification.InProc. IEEE Int. Workshop on Policies for Distributed Systems and Networks, pages223-232. DOI: 10.1109/POLICY.2005.25 Cited on page(s) 34 10.1109/POLICY.2005.25
3. System R
4. C. Batini and M. Scannapieco (2006) Data Quality: Concepts, Methodologies and Techniques, Springer. Cited on page(s)67
5. D. Bell and L. LaPadula (1976) Secure Computer Systems: Unified Exposition and Multics Interpretation. Technical report, MTR-2997, Mitre Corporation. Cited on page(s) 18
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Survey on Predictive Algorithms to Detect Insider Threat on a Network Using Different Combination of Machine Learning Algorithms;2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG);2024-04-02
2. Divine and mortal loves;Religious Studies;2023-03-15
3. Systematic review of SIEM technology: SIEM-SC birth;International Journal of Information Security;2023-01-02
4. Dealing with Dark Data – Shining a Light;Knowledge Management in Organisations;2023
5. Security with Privacy;Encyclopedia of Complexity and Systems Science;2021