共 93 条
[31]
Clifton C., 2000, J COMPUTER SECURITY, V8
[32]
Crampton J., 2003, ACM Transactions on Information and Systems Security, V6, P201, DOI 10.1145/762476.762478
[34]
Denning D. E., 1980, ACM Transactions on Database Systems, V5, P88, DOI 10.1145/320128.320138
[35]
Denning D. E., 1980, ACM Transactions on Database Systems, V5, P291, DOI 10.1145/320613.320616
[36]
LATTICE MODEL OF SECURE INFORMATION-FLOW
[J].
COMMUNICATIONS OF THE ACM,
1976, 19 (05)
:236-243
[37]
DIAO Y, 2004, P VER LARG DAT C
[38]
EISENBERG A, 1999, SQL 1999 FOORMERLY K
[39]
Fagin R., 1978, ACM Transactions on Database Systems, V3, P310, DOI 10.1145/320263.320288
[40]
*FED TRAD COMM, 2000, FTC ANN SETTL BANKR