4Liu P. Architectures for Intrusion Tolerant Database Systems [ C]. In: Proc. of 18th Annual Computer Security Applications Conf. Las Vegas, Nevada,Dec. 2002.
5Ammann P, Jajodia S, McCollum C D, Blaustern B T. Surviving information warfare attacks on databases [ C]. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.164-174.
6Yip R, Levitt K. Data Level Inference Detection in Database Systems[ C]. In: Proc. of the 11th IEEE Computer Security Foundations Workshop, Rockport,Massachusetts, June 1998. 179 -189.
7Alexander Brodsky,Csilla Farkas,Sushil Jajodia. Secure Databases:Constraints,Inference Channels,and Monitoring Disclosures[J].IEEE Transactions on Knowledge and Data Engineering, 2000; 12 (6)
8S Jajodia,C Meadows. Inference problem in Multilevel Secure Database Management Systems, Information Security[C].In: M D Abrams,S Jajodia,H Podell eds.An Integrated Collection of Essays,Los Alamitos,Cailf:IEEE CS Press, 1995:570~584
9Donald G Marks. Inference in MLS Database Systems[J].IEEE Transactions on Knowledge and Data Engineering,1996;8(1) :46~55