[1]
Y. ITAI, A. OLUDELE PhD, and N. GOGA PhD, “Trigger and Database Security”,
IJCT
, vol. 4, no. 1, pp. 57–62, Feb. 2013.