Security constraint processing in a multilevel secure distributed database management system | IEEE Journals & Magazine | IEEE Xplore