Submodule
1: Overview of Database Security
Created: July 14, 2003
Last Updated: March 11, 2004
- Bishop, Matt. Computer Security: Art and Science.
Addison Wesley, 2002.
- Silvana Castano, Maria Grazia Fugini, Giancarlo Martella,
Pierangela Samarati: Database Security. (Contents) 1995, Addison-Wesley &
ACM Press, ISBN 0-201-59375-0
- Dorothy E. Denning, Peter J. Denning: Data Security. ACM
Computing Surveys 11(3): 227-249 (1979)
- Parker D.B. (1984). The many faces of data vulnerability.
IEEE Spectrum, 21(5)
- David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases:
Protection Against User Influence. TODS 4(1): 97-106 (1979)
- Denning F.J. ed. (1990). Computers under Attack: Intruders,
Worms, and Viruses. Addison-Wesley
- Saltzer J.D. and Schroeder M.D. (1975). The protection of information in
computer systems. Proc. IEEE, 63(9)