1. Jeong HC. The security of medical information system. KISS. 1998; 16(12):141–145.
2. Bell DE, LaPadula LJ. Secure computer systems: unified exposition and multics interpretation. Technical Report MTR-2997 Mitre Corp. 1976.
3. Castano S. Database security. Addison-Wesley;1994. p. 82–96.
4. Pfleeger CP. Security in computing. Prentice Hall;1989. p. 249–250.
5. Jeong HC. Dynamic multiversion control in multilevel security environments. KIPS. 1997; 3(4):123–130.
6. Keefe TF, Tsai WT. Multiversion concurrency control for multilevel secure database systems. IEEE:Security and Privacy;1990. p. 369–383.
7. Jajodia S, Atluri V. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases. IEEE:Security and Privacy;1992.
8. Atluri V, Bertino E, Jajodia S. Providing different degrees of recency options to transactions in multilevel secure databases. IFIP:WG 11.3. Database Security;1995. p. 199–221.
9. Pal S. A locking protocol for multilevel secure databases providing support for long transactions. IFIP:WG 11.3. Database Security;1995. p. 119–121.
10. Graubart R. A comparison of three secure DBMS architectures. IFIP:WG 11.3. Database Security;1989. p. 130–135.
11. Care M, Stonebraker M. The performance of concurrency control algorithm for database management systems. IEEE:10th VLDB. 1984; 107–118.
12. Agrawel D, Abbadi A, Lang A. Performance characteristics of protocols with ordered shared locks. IEEE: 7th Data Engineering;1991. p. 592–601.
13. Choi YG. The performance of concurrency control in multilevel secure database management system. MS thesis. Kaist;1995.
14. Jeong HC, Lim CG. Transaction serializability with security in heterogeneous medical database systems. J of KOSMI. 1999; 5(3):109–118.
Article
15. Jeong HC. Multilevle secure recovery management of medical databases in hospital information system. J of KOSMI. 2000; 6(2):17–25.