Login / Signup
Architecture for an embedded secure data base management system.
Cynthia E. Irvine
Roger R. Schell
Linda L. Vetter
Published in:
ACSAC (1990)
Keyphrases
</>
data base management systems
acid properties
real time
management system
application level
database
network architecture
lightweight
wireless networks
security requirements
security analysis
authentication scheme
security architecture