Journal articles on the topic 'Databases security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Databases security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Full textAhmad, Khaleel, Mohammad Shoaib Alam, and Nur Izura Udzir. "Security of NoSQL Database Against Intruders." Recent Patents on Engineering 13, no. 1 (February 8, 2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.
Full textLysetskyi, Yu M., and D. Y. Kalbazov. "Information security of corporate databases." Mathematical machines and systems 3 (2023): 31–37. http://dx.doi.org/10.34121/1028-9763-2023-3-31-37.
Full textHaikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, and Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (June 18, 2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.
Full textKyrychenko, I. V., О. S. Nazarov, I. V. Gruzdo, and N. Kozel. "SECURITY IN DECENTRALIZED DATABASES." Bionics of Intelligence 1, no. 92 (June 2, 2019): 59–64. http://dx.doi.org/10.30837/bi.2019.1(92).10.
Full textNeto, Afonso Araújo, and Marco Vieira. "Security Gaps in Databases." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 42–62. http://dx.doi.org/10.4018/jsse.2011070103.
Full textPernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (October 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.
Full textThuraisingham, Bhavani. "Security for Distributed Databases." Information Security Technical Report 6, no. 2 (June 2001): 95–102. http://dx.doi.org/10.1016/s1363-4127(01)00210-2.
Full textTeimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems." UHD Journal of Science and Technology 5, no. 2 (October 10, 2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.
Full textArputharaj J, Vijay, and Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 1 (June 30, 2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.
Full textVishwakarma, Jaychand, and Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.
Full textMamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (July 30, 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Full textGudriks, Rinalds, and Sergejs Kodors. "POSTGRESQL DATABASES SECURITY CONFIGURATION CHECKLIST." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 23 (April 24, 2019): 38. http://dx.doi.org/10.17770/het2019.23.4386.
Full textYerkey, A. Neil. "Security of Microsoft Access Databases." Library & Archival Security 17, no. 2 (March 2001): 29–43. http://dx.doi.org/10.1300/j114v17n02_04.
Full textHenley, Stephen. "Project databases: standards and security." Geological Society, London, Special Publications 97, no. 1 (1995): 97–101. http://dx.doi.org/10.1144/gsl.sp.1995.097.01.12.
Full textLipton, J. D. "Security Interests in Electronic Databases." International Journal of Law and Information Technology 9, no. 1 (March 1, 2001): 65–86. http://dx.doi.org/10.1093/ijlit/9.1.65.
Full textAhlswede, R., and H. Aydinian. "On Security of Statistical Databases." SIAM Journal on Discrete Mathematics 25, no. 4 (January 2011): 1778–91. http://dx.doi.org/10.1137/070689589.
Full textLaferriere, Claude, G. Owen Higginson, and Gordon G. Bell. "Security architectures for textual databases." Computers & Security 9, no. 7 (November 1990): 621–30. http://dx.doi.org/10.1016/0167-4048(90)90061-w.
Full textHashim, Hassan Bediar. "Challenges and Security Vulnerabilities to Impact on Database Systems." Al-Mustansiriyah Journal of Science 29, no. 2 (November 17, 2018): 117. http://dx.doi.org/10.23851/mjs.v29i2.332.
Full textITAI, YAYA, AWODELE OLUDELE PhD, and NICOLAE GOGA PhD. "Trigger and Database Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (February 1, 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Full textP.J, Sankaranarayanan, and Geogen George. "Blockchain Based Aadhaar Security." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.
Full textS R V Satish, Karuturi. "Database Security Issues and Challenges in Cloud Computing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (April 5, 2024): 937–43. http://dx.doi.org/10.17762/ijritcc.v11i11.10396.
Full textMocean, Loredana, and Miranda-Petronella Vlad. "Database Security in RDF Terms." Scientific Bulletin 28, no. 1 (June 1, 2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.
Full textNICA, ELVIRA, BOGDAN GEORGE TUDORICA, DOREL-MIHAIL DUSMANESCU, GHEORGHE POPESCU, and ALINA MARIA BREAZ. "Databases Security Issues - A Short Analysis on the Emergent Security Problems Generated By NoSQL Databases." ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH 53, no. 3/2019 (September 21, 2019): 113–29. http://dx.doi.org/10.24818/18423264/53.3.19.07.
Full textChen, Ailin, Shaoyuan Yu, Xinyi Yang, Ding Huang, and Yongjun Ren. "IoT data security in outsourced databases: A survey of verifiable database." Heliyon 10, no. 7 (April 2024): e28117. http://dx.doi.org/10.1016/j.heliyon.2024.e28117.
Full textStenin, Dmitriy, Natalya Stenina, Arman Akanov, and Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes." E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.
Full textAshwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza, Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza. "Access Control Models in NoSQL Databases: An Overview." journal of king abdulaziz university computing and information technology sciences 8, no. 1 (March 10, 2019): 1–9. http://dx.doi.org/10.4197/comp.8-1.1.
Full textAlshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.
Full textAgarwal, Archita, Maurice Herlihy, Seny Kamara, and Tarik Moataz. "Encrypted Databases for Differential Privacy." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 170–90. http://dx.doi.org/10.2478/popets-2019-0042.
Full textYesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, and Stanislaw A. Rajba. "Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model." Applied Sciences 11, no. 23 (November 25, 2021): 11175. http://dx.doi.org/10.3390/app112311175.
Full textAlshammari, Ahmad. "Structuring and organizing database security domain from big data perspective using meta-modeling approach." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 2 (February 2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.
Full textVilihura, Vladislav, Yuriy Gorbenko, Vitaliy Yesin, and Serhiy Rassomakhin. "Using formal security models in secure databases." Physico-mathematical modelling and informational technologies, no. 32 (July 7, 2021): 70–74. http://dx.doi.org/10.15407/fmmit2021.32.070.
Full textDempsey, B. J., and J. Herrin. "WEB-Enabled Medical Databases: a Threat to Security?" Methods of Information in Medicine 39, no. 04/05 (2000): 298–302. http://dx.doi.org/10.1055/s-0038-1634448.
Full textJamali, Mujeeb-ur-Rehman, Najma Imtiaz Ali, Imtiaz Ali Brohi, Muhammad Umar Murad, Yasir Nawaz, and Uswa Urooj. "An Empirical Evaluation of Data Integrity Algorithm Performance in Non-Relational Document Databases." VAWKUM Transactions on Computer Sciences 11, no. 2 (December 8, 2023): 70–82. http://dx.doi.org/10.21015/vtcs.v11i2.1663.
Full textKunda, Douglas, and Hazael Phiri. "A Comparative Study of NoSQL and Relational Database." Zambia ICT Journal 1, no. 1 (December 11, 2017): 1–4. http://dx.doi.org/10.33260/zictjournal.v1i1.8.
Full textLarchenko, Maryna. "MODERN PROBLEMS OF CRYPTOGRAPHIC PROTECTION OF DATABASES." Technical Sciences and Technologies, no. 3(29) (2022): 102–13. http://dx.doi.org/10.25140/2411-5363-2022-3(29)-102-113.
Full textLi, Guoliang, Haowen Dong, and Chao Zhang. "Cloud databases." Proceedings of the VLDB Endowment 15, no. 12 (August 2022): 3758–61. http://dx.doi.org/10.14778/3554821.3554893.
Full textŚlęzak, Łukasz, and Jarosław Butanowicz. "Security of Statistical Databases as an element of Enterprise Security Architecture." Computer Science and Mathematical Modelling 13, no. 13 (December 30, 2014): 37–44. http://dx.doi.org/10.5604/15084183.1136516.
Full textGele, Aori. "Study on the Security of the Databases in Cloud Computing Environment." Applied Mechanics and Materials 443 (October 2013): 473–76. http://dx.doi.org/10.4028/www.scientific.net/amm.443.473.
Full textPoltavtsev, A. A., A. R. Khabarov, and A. O. Selyankin. "Inference Attacks and Information Security in Databases." Automatic Control and Computer Sciences 54, no. 8 (December 2020): 829–33. http://dx.doi.org/10.3103/s0146411620080271.
Full textM., Monisha, Narmathadevi V., and D. Kerana Hanirex. "Enhancing Security and Consistency for Cloud Databases." Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, no. 3 (March 31, 2015): 49–63. http://dx.doi.org/10.53555/nncse.v2i3.488.
Full textAgrawal, D. "Integrating Security with Fault-tolerant Distributed Databases." Computer Journal 33, no. 1 (January 1, 1990): 71–78. http://dx.doi.org/10.1093/comjnl/33.1.71.
Full textHansen, Steven C. "Hybrid inferential security methods for statistical databases." ACM SIGAPP Applied Computing Review 3, no. 1 (June 20, 1995): 14–18. http://dx.doi.org/10.1145/214310.214433.
Full textThuraisingham, Bhavani. "Security and Privacy Issues for Sensor Databases." Sensor Letters 2, no. 1 (March 1, 2004): 37–47. http://dx.doi.org/10.1166/sl.2004.022.
Full textMariuţa, Şerban. "Principles of Security and Integrity of Databases." Procedia Economics and Finance 15 (2014): 401–5. http://dx.doi.org/10.1016/s2212-5671(14)00465-1.
Full textDoyle, Sean D. "The Security, Audit and Control of Databases." Computer Fraud & Security Bulletin 1992, no. 3 (March 1992): 17–18. http://dx.doi.org/10.1016/0142-0496(92)90221-4.
Full textPaniagua Diez, Fidel, Amrutha Chikkanayakanahalli Vasu, Diego Suarez Touceda, and Jose Maria Sierra Camara. "Modeling XACML Security Policies Using Graph Databases." IT Professional 19, no. 6 (November 2017): 52–57. http://dx.doi.org/10.1109/mitp.2017.4241465.
Full textDavid, Baptiste, Dorian Larget, and Thibaut Scherrer. "The security of databases: the Access case." Journal of Computer Virology and Hacking Techniques 9, no. 2 (March 12, 2013): 95–107. http://dx.doi.org/10.1007/s11416-013-0182-7.
Full textKarpisz, Dariusz, Anna Kiełbus, and Maryna Zembytska. "Selected Problems of Industry Databases and Information Infrastructure Security." Quality Production Improvement - QPI 1, no. 1 (July 1, 2019): 371–77. http://dx.doi.org/10.2478/cqpi-2019-0050.
Full textSubach, I., and O. Vlasenko. "Architecture of intelligent SIEM for detecting cyber incidents in databases of military information and communication systems." Communication, informatization and cybersecurity systems and technologies, no. 4 (December 21, 2023): 82–92. http://dx.doi.org/10.58254/viti.4.2023.07.82.
Full text