List of Figures. List of Tables. Preface. 1. Introduction. 2. Traditional Transaction Processing. 3. Transaction Processing in MLS Databases. 4. Secure Transaction Processing in Real-Time Databases. 5. Secure Workflow Transaction Processing. 6. Secure Buffer Management. 7. Applications to Hierarchical and Replicated Databases. 8. Challenges. References. Index.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want