Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2014_7_a42, author = {N. O. Tkachenko}, title = {Implementation of {RDBMS} {MySQL} security monitor in {DBF/DAM} systems}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {99--101}, publisher = {mathdoc}, number = {7}, year = {2014}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2014_7_a42/} }
N. O. Tkachenko. Implementation of RDBMS MySQL security monitor in DBF/DAM systems. Prikladnaya Diskretnaya Matematika. Supplement, no. 7 (2014), pp. 99-101. http://geodesic.mathdoc.fr/item/PDMA_2014_7_a42/
[1] Database Activity Monitoring/Database Firewall, http://www.provision.ro/threat-management/database-security/database-activity-monitoring-database-firewall#pagei-1|pagep-1|
[2] Kolegov D. N., Tkachenko N. O., Chernov D. V., “Razrabotka i realizatsiya mandatnykh mekhanizmov upravleniya dostupom v SUBD MySQL”, Prikladnaya diskretnaya matematika. Prilozhenie, 2013, no. 6, 62–67
[3] Hinz S., DuBois P., Stephens J., MySQL 5.7 Reference Manual, http://dev.mysql.com/doc/refman/5.7/en/mysql-proxy.html
[4] Ierusalimschy R., Henrique de Figueiredo L., Celes W., The Programming Language Lua. Lua 5.2 Reference Manual, http://lua.org/manual/5.2/