[1]
Bell D E, Leonard J L. Secure Computer System: Unified Expositionand MULTICS Interpretation[R]. Bedford, MA, USA: The MitreCorporation, Tech. Rep.: MTR-2997, (1976).
Google Scholar
[2]
L. Cholvy and F. Cuppens. Providing Consistent Views in a Polyinstantiated Database. Eighth Annual Working Conference on Database Security, August (1994).
Google Scholar
[3]
Sushil Jajodia and Catherine Meadows, Inference Problems in Multilevel Secure Database Management Systems, Information Security, Essay 24.
Google Scholar
[4]
Agrawal R, Evfimievski A, Srikant R. Information Sharing AcrossPrivate Databases, Proceedings of ACM SIGMOD InternationalConference on Management of Data, 2003-06: 86-97.
DOI: 10.1145/872757.872771
Google Scholar
[5]
HectorGarcia-Molina, Jeffery D. Uiiman, The Implementation of Database System. Machinery Industry Press. (2001).
Google Scholar
[6]
Feng Zhaoyang. Yue Lihua, et al. The key Loophole Problem of the Existing Multilevel Secure Data Model and the Eliminating Method, Computer engineering and Applications, (2005).
Google Scholar
[7]
Kantarcioglu M, Clifton C. Privacy-preserving Distributed Miningof Association Rules on Horizontally Partitioned Data, Proc. ofIEEE Transactions on Knowledge and Data Engineering, 2004-09: 1026-1037.
DOI: 10.1109/tkde.2004.45
Google Scholar