Possibility theory: As a means for modeling computer security and protection
MVL '78 Proceedings of the eighth international symposium on Multiple-valued logic
ICSE '76 Proceedings of the 2nd international conference on Software engineering
Architectural approaches to secure databases
ACM SIGSMALL Newsletter
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
An overview of recent data base research
ACM SIGMIS Database
Hi-index | 0.00 |