Literatura académica sobre el tema "Database security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Database security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Database security"
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar y Supriya N. Deshpande. "Database Security". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Texto completoDenning, D. E. "Database Security". Annual Review of Computer Science 3, n.º 1 (junio de 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Texto completoLunt, Teresa F. y Eduardo B. Fernandez. "Database security". ACM SIGMOD Record 19, n.º 4 (diciembre de 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Texto completoMorrison, Paul. "Database Security". Network Security 2003, n.º 6 (junio de 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Texto completoParisi, Cameron y Samantha Renicker. "Database security". Advances in Engineering Innovation 2, n.º 1 (7 de octubre de 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Texto completoSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar y Leon Jololian. "Database and database application security". ACM SIGCSE Bulletin 41, n.º 3 (25 de agosto de 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Texto completoITAI, YAYA, AWODELE OLUDELE PhD y NICOLAE GOGA PhD. "Trigger and Database Security". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, n.º 1 (1 de febrero de 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Texto completoMamta Rani. "Database security at cache layer". International Journal of Science and Research Archive 9, n.º 2 (30 de julio de 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Texto completoMehta, Raju. "Oracle Database Security". Information Systems Security 13, n.º 5 (noviembre de 2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.
Texto completoHarris, Duncan y David Sidwell. "Distributed database security". Computers & Security 13, n.º 7 (enero de 1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.
Texto completoTesis sobre el tema "Database security"
Sakhi, Imal. "Database security in the cloud". Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Texto completoChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases". online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Texto completoWong, Wai-kit y 王偉傑. "Security and computability in database applications". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Texto completoKong, Yibing. "Security and privacy model for association databases". Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Texto completoHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Texto completoChen, Yu. "Protection of database security via collaborative inference detection". Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Texto completoBernagozzi, Stefano. "Range Queries on an encrypted outsourced database". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Texto completoPokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Texto completoHo, Sze-lok y 何思樂. "Technical solutions for conducting investigations in digital age". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Texto completopublished_or_final_version
Computer Science
Master
Master of Philosophy
Zhang, Ye y 张叶. "Query and access control over encrypted databases". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Texto completoLibros sobre el tema "Database security"
Samarati, Pierangela y Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Texto completoMelissa, Zgola y Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Buscar texto completoSilvana, Castano, ed. Database security. New York, N.Y: ACM Press, 1995.
Buscar texto completoSpooner, David L., Steven A. Demurjian y John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Texto completoLin, T. Y. y Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Texto completoJajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Texto completoMustafa, Osama y Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Texto completoGertz, Michael y Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Texto completoF, Lunt Teresa y Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.
Buscar texto completoIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Buscar texto completoCapítulos de libros sobre el tema "Database security"
Willis, Thearon. "Database Security". En Practical Database Design for the Web, 176–94. Berkeley, CA: Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5377-8_8.
Texto completoMalcher, Michelle. "Database Security". En DBA Transformations, 69–82. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3243-9_6.
Texto completoBertino, Elisa, Ji-Won Byun y Ashish Kamra. "Database Security". En Security, Privacy, and Trust in Modern Data Management, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_7.
Texto completoFerrari, Elena. "Database Security". En Encyclopedia of Database Systems, 728–32. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_111.
Texto completoFerrari, Elena. "Database Security". En Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_111-2.
Texto completoFerrari, Elena. "Database Security". En Encyclopedia of Database Systems, 974–79. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_111.
Texto completoKaufmann, Michael y Andreas Meier. "Database Security". En SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.
Texto completoLunt, Teresa F. "Strategic Directions in Computer Security Research". En Database Security, 3–10. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Texto completoSandhu, Ravi y John Campbell. "Open Issues in Database Security". En Database Security, 169–73. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_10.
Texto completoJajodia, Sushil, Luigi V. Mancini y Indrajit Ray. "Secure Locking Protocols for Multilevel Database Management Systems". En Database Security, 177–94. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_11.
Texto completoActas de conferencias sobre el tema "Database security"
Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar y Leon Jololian. "Database and database application security". En the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562909.
Texto completoBeaubouef, Theresa y Frederick E. Petry. "Database security issues in rough relational databases". En 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.
Texto completoGuimaraes, Mario, Meg Murray y Richard Austin. "Incorporating database security courseware into a database security class". En the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409914.
Texto completoCinar, Onur, R. Haluk Guncer y Adnan Yazici. "Database Security in Private Database Clouds". En 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016. http://dx.doi.org/10.1109/icissec.2016.7885847.
Texto completoAwodiji, Temitope. "Database Security in a Dynamic IT world". En 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.
Texto completoBlake, Errol A. "Network and database security". En the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409937.
Texto completoSingh, Prabhsimran y Kuljit Kaur. "Database security using encryption". En 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155019.
Texto completoGuimaraes, Mario A. M., Richard Austin y Huwida Said. "Database forensics". En 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940958.
Texto completoJoo, Hankyu. "Practical Database Encryption Scheme for Database-as-a-Service". En Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.93.08.
Texto completoDenning, Dorothy E., Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell y Mark Heckman. "Views for Multilevel Database Security". En 1986 IEEE Symposium on Security and Privacy. IEEE, 1986. http://dx.doi.org/10.1109/sp.1986.10012.
Texto completoInformes sobre el tema "Database security"
Baer, M., R. Charlet, W. Hardaker, R. Story y C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, marzo de 2007. http://dx.doi.org/10.17487/rfc4807.
Texto completoBurns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, julio de 1993. http://dx.doi.org/10.21236/ada268885.
Texto completoLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, marzo de 1991. http://dx.doi.org/10.21236/ada237573.
Texto completoPolk, W. Timothy y Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.
Texto completoKang, Myong H., Judith N. Froscher, John McDermott, Oliver Costich y Rodney Peyton. Achieving Database Security Through Data Replication: The Sintra Prototype. Fort Belvoir, VA: Defense Technical Information Center, enero de 1994. http://dx.doi.org/10.21236/ada464289.
Texto completoNotargiacomo, LouAnna y Teresa Lunt. Research Directions in Database Security VI: Proceedings of the Rome Laboratory Multilevel Database Security Workshop (6th) Held at the Southwest Harbor, Maine on 22-24 June 1994. Fort Belvoir, VA: Defense Technical Information Center, septiembre de 1995. http://dx.doi.org/10.21236/ada300794.
Texto completoDe Paula, Everton G. y Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, febrero de 1991. http://dx.doi.org/10.21236/ada235448.
Texto completoCarpenter, R. y D. Sweeney. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits. Office of Scientific and Technical Information (OSTI), marzo de 1995. http://dx.doi.org/10.2172/86892.
Texto completoPerlo-Freeman, Sam, Elisabeth Sköns, Carina Solmirano y Helen Wilandh. Trends in World Military Expenditure, 2012. Stockholm International Peace Research Institute, abril de 2013. http://dx.doi.org/10.55163/mqgg1283.
Texto completoMITRE CORP BEDFORD MA. Proceedings of the IFIP WG 11.3 Working Conference on Database Security (6th) Held in Vancouver, British Columbia on 19-22 August 1992. Fort Belvoir, VA: Defense Technical Information Center, enero de 1992. http://dx.doi.org/10.21236/ada298828.
Texto completo