2[1]Ramamritham K. Real-time databases [J]. International Journal of Distributed and Parallel Databases, 1993,1 (2):199-226.
3[2]Bell D E, LaPadula L J. Secure computer systems: mathematical foundations and model (Technical Report, MTR2547) [R]. Bedford, MA, USA: Mitre Corporation, 1973.
4[3]Abbott R, Garcia-Molina H. Scheduling real-time transactions: a performance evaluation [J]. ACM Transactions on Database Systems, 1992,17 : 513-560.
5[4]Son S H, Chaney C, Thomlinson N. Partial security policies to support timeliness in secure real-time databases [A]. IEEE Symposium on Security and Privacy [C]. IEEE, 1998.
6[5]Ahmed Q N, Vrbsky S V. Issues in security for real-time databases [A]. Proceedings of the ACMSE Conference [C]. ACMSE, 1998.
7C M Krishna,Kang G Shin.Real-time System[M].New York:McGraw- Hill Companies, Inc, 1997.
8Yu-Wei Chen,Le Gruenwald.Research Issues for a Nested Transaction Model[M].IEEE, 0-8186-6375-8/94,1994.
9T Harder,K Rothermel.Concurrency Control Issues in Nested Transactions[J].VLDB Journal, 1993 ;2( 1 ) : 39-74.