Archive > Volume 26 Issue 7 > 2003,26(7):124-127. DOI:10.11835/j.issn.1000-582X.2003.07.032 CSTR:[cstr] Prev Next

Design and Realization of Database Security Proxy Based on MIDAS