Glover et al, "Multilevel Secure Databases: A New Approach", IEEE Proc of the Southeascon '91, 7-10 Apr. 1991, p. 690-694, vol. 2. |
Collins et al, "Security Constraint Processing During the Update Operation in a Multilevel Secure Database Management System", Proc Serenth Annual Computer Security Applications Conference, 2-6 Dec. 1991, pp. 23-32. |
Thuraisingham et al, "Secure Query Processing Using AI Techniques," Proc of the Twenty-First Annual International Conference on System Sciences,5-8 Jan. 1988, pp. 561-570. |
Meadows et al, "Maintaining Correctmess, Availability, and Unambiguity in Trusted Database Management Systems," Fourth Aerospace Computer Security Applications Conference, 12-16 Dec. 1988 , pp. 106-110. |
Irvime et al, "Architecture for an Embedded Secure Data Base Management System", Proc of the Sixth Annual Computer Security Applications Conference, 3-7 Dec 1990, pp. 125-136. |