[1] Christoph,L.S., Eugene,H.S., 1997. A reference model for firewall technology. Proceedings of the 13th Annual Computer Security Applications Conference(ACSAC), p.133-145.
[2] Denning,D., 1985. Commutative filters for reducing inference threats in multilevel database systems. Proceedings of IEEE Symposium on Security and Privacy, p.134-146.
[3] Graubert,R., Duffy,K., 1985. Design overview for retrofitting integrity-lock architecture onto a commercial DBMS. Proceedings of IEEE Symposium on Security and Privacy, p.147-159.
[4] Ioannidis,S., Keromytis,A., Bellovin,S., et al., 2000. Implementing a distributed firewall. Proceedings of Computer and Communications Security, p.190-199.
[5] McDermott,J., 1997. Replication does survive information warfare attacks. Proceedings of IFIP WG 11.3 Annual Working Conference on Database Security, p.219-228.
[6] Paul,A., Sushil,J., Catherine,D., et al., 1997. Surviving information warfare attacks on databases. Proceedings of IEEE Symposium on Security and Privacy, p.164-174.
Open peer comments: Debate/Discuss/Question/Opinion
<1>