Data base security: requirements, policies, and models | IBM Journals & Magazine | IEEE Xplore