Auswahl der wissenschaftlichen Literatur zum Thema „Databases security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Databases security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Databases security"
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar und Supriya N. Deshpande. „Database Security“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 4 (30.04.2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Der volle Inhalt der QuelleAhmad, Khaleel, Mohammad Shoaib Alam und Nur Izura Udzir. „Security of NoSQL Database Against Intruders“. Recent Patents on Engineering 13, Nr. 1 (08.02.2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.
Der volle Inhalt der QuelleLysetskyi, Yu M., und D. Y. Kalbazov. „Information security of corporate databases“. Mathematical machines and systems 3 (2023): 31–37. http://dx.doi.org/10.34121/1028-9763-2023-3-31-37.
Der volle Inhalt der QuelleHaikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan und Hamdani Arif. „Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33“. Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, Nr. 2 (18.06.2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.
Der volle Inhalt der QuelleKyrychenko, I. V., О. S. Nazarov, I. V. Gruzdo und N. Kozel. „SECURITY IN DECENTRALIZED DATABASES“. Bionics of Intelligence 1, Nr. 92 (02.06.2019): 59–64. http://dx.doi.org/10.30837/bi.2019.1(92).10.
Der volle Inhalt der QuelleNeto, Afonso Araújo, und Marco Vieira. „Security Gaps in Databases“. International Journal of Secure Software Engineering 2, Nr. 3 (Juli 2011): 42–62. http://dx.doi.org/10.4018/jsse.2011070103.
Der volle Inhalt der QuellePernul, G., und A. M. Tjoa. „Security Policies for Databases“. IFAC Proceedings Volumes 25, Nr. 30 (Oktober 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.
Der volle Inhalt der QuelleThuraisingham, Bhavani. „Security for Distributed Databases“. Information Security Technical Report 6, Nr. 2 (Juni 2001): 95–102. http://dx.doi.org/10.1016/s1363-4127(01)00210-2.
Der volle Inhalt der QuelleTeimoor, Ramyar Abdulrahman. „A Review of Database Security Concepts, Risks, and Problems“. UHD Journal of Science and Technology 5, Nr. 2 (10.10.2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.
Der volle Inhalt der QuelleArputharaj J, Vijay, und Dr R. Manicka Chezian. „A Collective Algorithmic ApproachFor Enhanced DNA Database Security“. INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, Nr. 1 (30.06.2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.
Der volle Inhalt der QuelleDissertationen zum Thema "Databases security"
Chung, Sun S. „Anti-Tamper Databases: Querying Encrypted Databases“. online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Der volle Inhalt der QuelleKong, Yibing. „Security and privacy model for association databases“. Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Der volle Inhalt der QuelleRedfield, Catherine M. S. „Practical security for multi-user web application databases“. Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76820.
Der volle Inhalt der QuelleThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 67-68).
Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can examine or alter the data in situ. Multiple Principal CryptDB protects against attacks on web application servers. By chaining encryption keys to user passwords, an attacker gaining access to decrypted data through issuing arbitrary queries to the database through CryptDB cannot access data belonging to offline users. A logging system and distributed key storage for CryptDB constrain the pool of possibly compromised data after an attack. Multiple Principal CryptDB can be used to secure the data of six web applications examined, with 2-8 lines of altered source code and 15-111 annotations added to the schema. On the phpBB web forum application, Multiple Principal CryptDB reduces throughput by only 14.5%, with 24 sensitive fields encrypted, and adds less than 26ms of latency to each individual query.
by Catherine M.S. Redfield.
M.Eng.
Zhang, Ye, und 张叶. „Query and access control over encrypted databases“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Der volle Inhalt der QuelleFarooqi, Norah. „Applying dynamic trust based access control to improve XML databases' security“. Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.
Der volle Inhalt der QuelleOfori-Duodu, Michael Samuel. „Exploring Data Security Management Strategies for Preventing Data Breaches“. ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Der volle Inhalt der QuelleOlk, Jeffrey S. „Exploring the lack of interoperability of databases within Department of Homeland Security interagency environment concerning maritime port security“. Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FOlk.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Bordetsky, Alex. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Interoperability, HSIN, Department of Homeland Security, Command and Control, Situational Awareness, Maritime Port Security, USCG, CBP. Includes bibliographical references (p. 63-67). Also available in print.
Kohler, Matthew J., und Shawn W. Stroud. „An effective access control mechanism and multilevel security for multilevel secure databases“. Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25865.
Der volle Inhalt der QuellePatterson, Joanna. „Cyber-Security Policy Decisions in Small Businesses“. ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.
Der volle Inhalt der QuelleHermansson, Tobias. „FiLDB : An Architecture for Securely Connecting Databases to the Internet“. Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Der volle Inhalt der QuelleToday more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.
There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.
The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.
Bücher zum Thema "Databases security"
Polischuk, Yuriy, und Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.
Der volle Inhalt der QuelleFaragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.
Den vollen Inhalt der Quelle findenIFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.
Den vollen Inhalt der Quelle findenIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Den vollen Inhalt der Quelle finden1956-, Atluri Vijay, und Samarati Pierangela, Hrsg. Security of data and transaction processing. Boston: Kluwer Academic, 2000.
Den vollen Inhalt der Quelle findenWiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.
Den vollen Inhalt der Quelle findenRodney, Clark, Holloway Simon und List William, Hrsg. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.
Den vollen Inhalt der Quelle findenOOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.
Den vollen Inhalt der Quelle findenIFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.
Den vollen Inhalt der Quelle findenDTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Databases security"
Kaufmann, Michael, und Andreas Meier. „Database Security“. In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.
Der volle Inhalt der QuelleAdam, Nabil, Haibing Lu, Jaideep Vaidya und Basit Shafiq. „Statistical Databases“. In Encyclopedia of Cryptography and Security, 1256–60. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_767.
Der volle Inhalt der QuelleOlivier, Martin S. „Integrity Constraints in Federated Databases“. In Database Security, 43–57. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_4.
Der volle Inhalt der QuelleBhatnagar, Neerja. „Security in Relational Databases“. In Handbook of Information and Communication Security, 257–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04117-4_14.
Der volle Inhalt der QuelleOzsoyoglu, Gultekin, David A. Singer und Sun S. Chung. „Anti-Tamper Databases“. In Data and Applications Security XVII, 133–46. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_10.
Der volle Inhalt der QuelleAisbett, J. E. „An information theoretic analysis of architectures for multilevel secure databases“. In Database Security, 212–25. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_13.
Der volle Inhalt der QuelleThuraisingham, Bhavani. „Foundations of Multilevel Databases“. In Research Directions in Database Security, 199–226. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4612-2870-7_18.
Der volle Inhalt der QuelleStoller, Scott D. „Trust Management in Databases“. In Encyclopedia of Cryptography and Security, 1326–27. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_693.
Der volle Inhalt der QuelleBiskup, Joachim, und Barbara Sprick. „Towards Unifying Semantic Constraints and Security Constraints“. In Semantics in Databases, 34–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36596-6_3.
Der volle Inhalt der QuelleOsborn, Sylvia L., Laura K. Reid und Gregory J. Wesson. „On the Interaction Between Role-Based Access Control and Relational Databases“. In Database Security, 275–87. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_17.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Databases security"
Beaubouef, Theresa, und Frederick E. Petry. „Database security issues in rough relational databases“. In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.
Der volle Inhalt der QuelleImran, Sohail, und Irfan Hyder. „Security Issues in Databases“. In 2009 Second International Conference on Future Information Technology and Management Engineering (FITME). IEEE, 2009. http://dx.doi.org/10.1109/fitme.2009.140.
Der volle Inhalt der QuelleOkman, Lior, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes und Jenny Abramov. „Security Issues in NoSQL Databases“. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.70.
Der volle Inhalt der QuelleBender, Gabriel, Lucja Kot und Johannes Gehrke. „Explainable security for relational databases“. In SIGMOD/PODS'14: International Conference on Management of Data. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2588555.2593663.
Der volle Inhalt der QuelleAhlswede, R., und H. Aydinian. „On security of statistical databases“. In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261767.
Der volle Inhalt der QuelleBi, Chuanxue, und Nenad Jukic. „A security paradigm for Web databases“. In the 37th annual Southeast regional conference (CD-ROM). New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/306363.306420.
Der volle Inhalt der QuelleOcenas, Martin, Ivan Homoliak, Petr Hanacek und Kamil Malinka. „Security and Encryption at Modern Databases“. In ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377644.3377662.
Der volle Inhalt der QuelleGui, Zichen, Oliver Johnson und Bogdan Warinschi. „Encrypted Databases“. In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3363210.
Der volle Inhalt der QuelleAwodiji, Temitope. „Database Security in a Dynamic IT world“. In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.
Der volle Inhalt der QuelleMhatre, Amit J., Srinivas Palla, Sharat Chikkerur und Venu Govindaraju. „Efficient search and retrieval in biometric databases“. In Defense and Security, herausgegeben von Anil K. Jain und Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.604173.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Databases security"
Jajodia, Sushil, und Boris Kogan. Implementation Issues in Multilevel Security for Object-Oriented Databases. Fort Belvoir, VA: Defense Technical Information Center, Mai 1990. http://dx.doi.org/10.21236/ada224489.
Der volle Inhalt der QuelleMiller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v1.
Der volle Inhalt der QuelleMiller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v2.
Der volle Inhalt der QuelleMiller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v3.
Der volle Inhalt der QuelleBaer, M., R. Charlet, W. Hardaker, R. Story und C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, März 2007. http://dx.doi.org/10.17487/rfc4807.
Der volle Inhalt der QuelleBurns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, Juli 1993. http://dx.doi.org/10.21236/ada268885.
Der volle Inhalt der QuelleLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, März 1991. http://dx.doi.org/10.21236/ada237573.
Der volle Inhalt der QuellePolk, W. Timothy, und Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.
Der volle Inhalt der QuelleBanerjee, Onil, Martin Cicowiez, Ana Rios und Cicero De Lima. Climate Change Impacts on Agriculture in Latin America and the Caribbean: An Application of the Integrated Economic-Environmental Modeling (IEEM) Platform. Inter-American Development Bank, November 2021. http://dx.doi.org/10.18235/0003794.
Der volle Inhalt der QuelleBurov, Oleksandr Yu, Svitlana H. Lytvynova, Сергій Олексійович Семеріков, Yuliia V. Yechkalo, Олександр Юрійович Буров, Світлана Григорівна Литвинова und Юлія Володимирівна Єчкало. ICT for disaster-resilient education and training. CEUR Workshop Proceedings, September 2023. http://dx.doi.org/10.31812/123456789/7826.
Der volle Inhalt der Quelle