[1]
Y. ITAI, A. OLUDELE PhD, and N. GOGA PhD, “Trigger and Database Security”, IJCT, vol. 4, no. 1, pp. 57–62, Feb. 2013.