- 1、ResearchandImplementationonProtectionTechnologyofHighSecureDBMS2、ResearchonSurvivalSecureDBMSandItsKeyTechnologies;3、ResearchandImplementationofUser-DefinedDataTypeoftheSecureDBMS4、DesignandImplementationofRoleBasedAccessControlinaSecureDBMS...
- 15517