[1]
Carter, David L., Katz, Andra J. Computer Crime: An Emerging Challenge for Law Enforcement[R]. American: FBI Law Enforcement Bulletin, December (1996).
Google Scholar
[2]
N. Yuhanna, Comprehensive Database Security Requires Native DBMS Features and Third-Party Tools, Market overview, Forrester Research Inc., May (2005).
Google Scholar
[3]
U. Mattsson, Database Encryption – How to Balanace Security with performance", ITtoolbox Database: http: / database ittoolbox. Com / documents/peer publishing / database – encrytion – how – to – balanace-security-with-performance-403, july 2005K. Elissa, "Title of paper if known, unpublished.
DOI: 10.2139/ssrn.670561
Google Scholar
[4]
R. Charlot, Providing an Infrastructure For A Cross Database Management Tool. " Proceedings of the International Conference on Information Technology: Coding and Computing(ITCC, 02). Washington, DC: IEEE Computer Society, 2000: 196-200.
DOI: 10.1109/itcc.2002.1000386
Google Scholar
[5]
I. Mohamed, K. Joan, C. Justin. A visual Database Management Tool: the Design of a Semi-intelligent DBA Tool for a Relational DBMS., Proceedings of the 8th International Workshop on Database and Expert Systems Application. Wahington, DC: IEEE computer Society, 1997: 366-371.
DOI: 10.1109/dexa.1997.617313
Google Scholar
[6]
L. D. Crenshaw . Database Performance Monitoring use of software tools and traditional processes.
Google Scholar
[7]
Francois Charvet, Ashish pande. database performance study.
Google Scholar
[8]
K. Nagaraja, F. Oliveira,R. Bianchini R.P. Martin, and T.D. Nguyen. Understanding and Validating Database System Administration,. In proc. USENIX Annual Technical Conference. (2006).
Google Scholar
[9]
Huang J, Qing SH, Wen HZ. Timed Role-Based Access Control. Journal of Software, 2003, 14(11): 1944-(1954).
Google Scholar
[10]
Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control,. ACM Transactions on Information and System Srcurity, 2001, 4(3): 224-274.
DOI: 10.1145/501978.501980
Google Scholar
[11]
Soon M. Chung and Pyeong S. Mah, Schema Integration for Multidatabase Using the Unified Relational and Object-Oriented Model, ACM.
Google Scholar
[12]
M. G. Ali. Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System, International Journal of Computer Science and Information Security, USA, (2009).
Google Scholar
[13]
D. Tsichritzis, A. Klug, The ANSI/X3/SPARC DBMS Framework Report of the Study Group on Database Managemnt Systems. Information Systems, 1: 17-191, (1978).
DOI: 10.1016/0306-4379(78)90001-7
Google Scholar