作者: T.F. Lunt , D.E. Denning , R.R. Schell , M. Heckman , W.R. Shockley
DOI: 10.1109/32.55088
关键词: Database 、 Reference monitor 、 Relational model 、 Computer security 、 Computer science 、 Computer security model 、 Data integrity 、 Polyinstantiation 、 Referential integrity 、 Entity integrity 、 Relational database
摘要: … and discretionary security within the database system itself, hence requiring more trusted code and duplication of some of the security functionality of the operating system. The need for …