@dblp

Reverse Engineering of Database Security Policies.

, , , and . DEXA (2), volume 8056 of Lecture Notes in Computer Science, page 442-449. Springer, (2013)

Links and resources

Tags