@dblp

Security Constraint Processing in a Distributed Database Environment.

, and . ACM Conference on Computer Science, page 356-363. ACM, (1994)

Links and resources

Tags