Last update: Fri Mar 2 02:05:31 MST 2018
Top |
Symbols |
Numbers |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Ammann:1999:DDC,
author = "Paul Ammann and Sushil Jajodia",
title = "Distributed Databases: Computer Security, Fault
Tolerance, and Software Assurance",
journal = j-IEEE-CONCURR,
volume = "7",
number = "1",
pages = "4--6",
month = jan # "\slash " # mar,
year = "1999",
CODEN = "IECMFX",
ISSN = "1092-3063 (print), 1558-0849 (electronic)",
ISSN-L = "1092-3063",
bibdate = "Tue Jan 16 06:04:50 MST 2001",
bibsource = "http://www.math.utah.edu/pub/tex/bib/ieeeconcurrency.bib",
URL = "http://dlib.computer.org/pd/books/pd1999/pdf/p1004.pdf",
acknowledgement = ack-nhfb,
}
Related entries
- Ammann, Paul,
5(2)8,
5(4)5
- database,
5(1)6,
5(1)9,
5(1)56,
5(2)8,
5(4)5,
5(4)32,
6(2)21,
7(2)85,
7(3)9,
8(4)91
- distributed,
5(1)13,
5(1)26,
5(1)41,
5(1)56,
5(1)86,
5(2)8,
5(2)39,
5(2)50,
5(2)86,
5(3)12,
5(3)16,
5(3)19,
5(3)20,
5(3)21,
5(3)55,
5(3)74,
5(3)76,
5(4)5,
5(4)13,
5(4)30,
5(4)32,
5(4)40,
5(4)69,
5(4)80,
5(4)82,
6(1)36,
6(1)47,
6(1)58,
6(1)86,
6(1)94,
6(2)16,
6(2)21,
6(2)40,
6(2)78,
6(2)93,
6(3)8,
6(3)20,
6(3)42,
6(3)52,
6(3)62,
6(3)86,
6(4)80,
7(1)70,
7(1)80,
7(2)85,
7(3)9,
7(4)11,
7(4)14,
7(4)52,
8(1)2,
8(1)26,
8(1)59,
8(2)2,
8(2)8,
8(2)24,
8(2)53,
8(2)86,
8(2)86,
8(3)14,
8(3)45,
8(3)48,
8(3)63,
8(4)55
- Fault,
5(3)12,
5(4)18,
5(4)69,
6(2)55,
6(3)34,
8(2)10,
8(3)74
- Jajodia, Sushil,
5(2)8,
5(4)5,
6(2)21,
7(2)85,
7(3)9
- security,
5(3)76,
6(3)34,
8(2)70,
8(4)4
- software,
5(1)6,
5(1)13,
5(1)16,
5(1)26,
5(1)41,
5(1)68,
5(2)28,
5(2)39,
5(2)60,
5(2)86,
5(2)88,
5(3)2,
5(3)12,
5(3)16,
5(3)20,
5(3)21,
5(3)23,
5(3)28,
5(3)38,
5(3)55,
5(3)64,
5(4)32,
5(4)54,
5(4)78,
6(1)2,
6(1)47,
6(1)58,
6(2)40,
6(2)71,
6(2)78,
6(3)20,
6(3)34,
7(2)83
- Tolerance,
8(2)10,
8(3)74