5Bishop M.A model of security monitoring[C]//Proceedingsof the 5th Annual Computer Security Applications Conference.Los Alamitos:IEEE Computer Society Press,1989:46-52.
6Orman L V.Database audit and control strategies[J].InformationTechnology and Management,2001,2(1):27-51.
7IBM.IBM InfoSphere guardium V9.0 helps you protectyour high-value data and automate your compliance policies[R].USA:IBM,2012.