1S Castano,M G Fugini,et al.Database Security[M].Addison Wesley,1994.
2Ahmad Baraani-Dastjerdi,Josef Pieprzyk,Reihaned Safavi-Naini.Security in Databases: A Survey Study[R].Department of Computer Science,University of Wollongong,1996.
3Chris Strahorn.Security in Next-Generation Databases[C].University of California,1998.
4Sushil Jajodia.Database Security and Privacy[J].ACM Computing Surveys,1996,28(1).
5Dorothye E Denning,Peter J Denning.Data Security[J].Computing Surveys,1979,II(3).
6GA/T 389-2002.计算机信息系统安全等级保护-数据库管理系统技术要求[S].2002.
7Fulkerson C,Gonsoulin M,Walz D.Database Security:Controlling Access to Your Most Valuable Information Asset[J].Strategic Finance,2002,84(12):48-54.
8Hsieh C,Lin B.Web-based Data Warehousing:Current Status and Perspective[J].Journal of Computer Information Systems,2003,43(4):1-8.
9Jeong M A,Kim J,Won Y.A Flexible Database Security Sys-tem Using Multiple Access Control Policies[M].Berlin Heidelberg:Springer-Verlag,2002.
10Persson A,Stirna J.Advanced Information Systems[C].Proc.of the 16th International Conference on Engineering,Latvia,2004-06-07.