4Liu P. Architectures for Intrusion Tolerant Database Systems [ C]. In: Proc. of 18th Annual Computer Security Applications Conf. Las Vegas, Nevada,Dec. 2002.
5Ammann P, Jajodia S, McCollum C D, Blaustern B T. Surviving information warfare attacks on databases [ C]. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.164-174.
6Yip R, Levitt K. Data Level Inference Detection in Database Systems[ C]. In: Proc. of the 11th IEEE Computer Security Foundations Workshop, Rockport,Massachusetts, June 1998. 179 -189.
7R. Sandhu and F. Chert. The multilevel relational(MLR) data model. A CM Transactions on Information and System Security, 1 (1),November 1998.
8P. G. Griffiths and B. Wade, An authorization Mechanism for a Relational Database System, ACM TODS, vol1. 1, no3, pp,242 - 255, sept. 1976.
9S. De Capitani di Vimercati ,P. Samarati, and S. Jajodia. Policies, Model.s,and Languages for Access Control DNIS 2005 ,LNCS 3433:225 -237.