Article,

Data Base Security: Requirements, Policies, and Models.

, , and .
IBM Syst. J., 19 (2): 229-252 (1980)

Meta data

Tags

Users

  • @dblp

Comments and Reviews