1 |
Rhee, Man Young, 'Cryptography and secure communication,' McGraw-Hill, 1994
|
2 |
R. Mukkamala and S. H. Son, 'A Secure Concurrency Control Protocol for Real-Time Databases,' IFIP TCll WG 11.3, 9th Working Conference of Database Security, 1995
|
3 |
Confirmed Test Vector and Program for RC4. on line available at http://www.qrst. de/html/ dsds/rc4.htm. 2004
|
4 |
S. J. Lee and H. Y. Bae, 'Data Compression Management Mechanism for Real -Time Main Memory Database Systems,' Proceedings of the 4th International Conference on Database Systems for Advanced Applications, 1995
|
5 |
S. Castano, et.al., Database Security, Addi- son- Wesley, Reading, MA, 1994
|
6 |
J. Huang, J. A. Stankovic, K. Ramamritham and D. Towsley, 'On Using Priority Inheritance in Real-Time Databases,' Proceedings 12th Real-Time Systems Symposium, IEEE, 1991
|
7 |
T. F. Lunt, Research Directions in Database Security, Springer-Verlag, 1992
|
8 |
S. H. Son and Y. K. Kim, 'Predictability and Consistency in Real-Time Database Systems,' Proceedings InfoScience, 1993
|
9 |
I. Mavridis, G. Pangalos, and M. Khair, 'EMEDAC : Role-Based Access Control Supporting Discretionary and Mandatory Features,' IFIP TCII WG11.3, 13th Working Conference on Database Security, 1999
|
10 |
Sang H. Son, 'Supporting Timeliness and Security in Real-Time Database Systems,' 9th Euromicro Workshop on Real-Time Systems, 1997
|
11 |
V. Atluri, S. Jajodia, and B. George, Multilevel Secure Transaction Processing, KLUWER ACADEMIC PUBLISHERS, 2000
|
12 |
Sang H. Son, Robert Zimmerman, and Jorgen Hansson, 'An Adaptable Security Manager for Real-Time Transactions,' 12th Euromicro Conference on Real-Time Systems, 2000
|