What people are saying - Write a review
We haven't found any reviews in the usual places.
Previous Data Security Work
A Distributed Architecture Data Security System
6 other sections not shown
A-Tuple access control access request action activated and/or application approach architecture associative authentication authorization DB checking command component computer system contains Data Base System data security system data-dependent DB system DBMS decision defined denied detection determine discussed distributed enforcement example execution FE processor field Figure fixed Formats front-end function given hardware his/her host identifier implementation independent indicated initial interface ISSC Language logical login main DB main DB access Management mean measurement mechanisms memory method mode Module object operating cost package performance overhead cost physical presented privileges problems procedure processing processor protection Query record referred Relation resource response retrieval safeguards Secondary Storage serviced single specific stored subsection supports system configuration system function system resources techniques terminal threat monitoring tion units user transaction user's utilization valid variable workload