Tesis sobre el tema "Database security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores tesis para su investigación sobre el tema "Database security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Sakhi, Imal. "Database security in the cloud." Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Texto completoChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Texto completoWong, Wai-kit, and 王偉傑. "Security and computability in database applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Texto completoKong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Texto completoHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Texto completoChen, Yu. "Protection of database security via collaborative inference detection." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Texto completoBernagozzi, Stefano. "Range Queries on an encrypted outsourced database." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Texto completoPokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Texto completoHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Texto completoZhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Texto completoPradhan, Sayli H. "User Interface Design, Database Connectivity, and Security in Fortified Cards." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10638557.
Texto completoPorter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Texto completoNeophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Texto completoZhang, Xiao Meng M. Eng Massachusetts Institute of Technology. "Designing a SQL query rewriter to enforce database Row Level Security." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106398.
Texto completoHong, Seng-Phil. "Data base security through simulation." Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/902465.
Texto completoOfori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Texto completoCui, Yingjie. "A study on privacy-preserving clustering." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B4357225X.
Texto completoPavlou, Kyriacos Eleftheriou. "Database Forensics in the Service of Information Accountability." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.
Texto completoAiello, Brady Benjamin. "Analyzing Global Cyber Attack Correlates Through an Open Database." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.
Texto completoGaadingwe, Tshepo Gaadingwe. "A critical review of the IFIP TC11 Security Conference Series." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/507.
Texto completoBai, Yun. "On formal specification of authorization policies and their transformations : thesis /." View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Texto completoNguyen, Anthony. "Database system architecture for fault tolerance and disaster recovery." [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:152.
Texto completoTao, Jia. "A model for storage and query of cascading beliefs in multilevel security database." [Ames, Iowa : Iowa State University], 2006.
Buscar texto completoBruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Texto completoRaybourn, Tracey. "Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions." Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.
Texto completoHuber, Matthias Christoph [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "Provable and Practical Security for Database Outsourcing / Matthias Christoph Huber. Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1113109289/34.
Texto completoReinsmith, Lee, and Steven Surber. "A PC Database and GUI for Telemetry Data Reduction." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608316.
Texto completoPerry, Sonja Michele. "An integrated intranet and dynamic database application for the Security Manager at Naval Postgraduate School." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FPerry.pdf.
Texto completoShah, Rahul Arvind. "Vulnerability assessment of Java bytecode." Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.
Texto completoCui, Yingjie, and 崔英杰. "A study on privacy-preserving clustering." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B4357225X.
Texto completoDaehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Texto completoWang, Shujing. "Logic programming based formal representations for authorization and security protocols." Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Texto completoKumka, David Harold. "Quantifying Performance Costs of Database Fine-Grained Access Control." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.
Texto completoPoe, Gary A. "Privacy in Database Designs: A Role Based Approach." Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Texto completoMiller, William B. "Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.
Texto completoMaphakela, Madidimalo Rabbie. "A model for legal compliance in the South African banking sector : an information security perspective." Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/725.
Texto completoLukanič, Michal. "Bezpečnost v databázi Oracle." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72438.
Texto completoWang, Shujing. "Logic programming based formal representations for authorization and security protocols." View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Texto completoChmel, Marek. "Informační systém pro školící centrum." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222276.
Texto completoBai, Yun. "On formal specification of authorization policies and their transformations : thesis." Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Texto completoHermansson, Tobias. "FiLDB : An Architecture for Securely Connecting Databases to the Internet." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Texto completoMotara, Yusuf Moosa. "File integrity checking." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.
Texto completoKalakota, Govardhan Reddy. "Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.
Texto completoNaujokas, Tomas. "Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944.
Texto completoKalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Texto completoWinner-Leoni, Melissa D. "An Investigation of the Security Designs of a Structured Query Language (SQL) Database and its Middleware Application and their Secure Implementation within Thinclient Environments." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/MWinnerLeoni2008.pdf.
Texto completoKalibjian, Jeff. "Data Security Architecture Considerations for Telemetry Post Processing Environments." International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.
Texto completoSubekti, Mohammad, and Widhya Bagya Prawiraatmadja. "A prototype database management system for the Budgeting System of the Department of Defense and security of the Republic of Indonesia." Thesis, Monterey, California. Naval Postgraduate School, 1985. http://hdl.handle.net/10945/21512.
Texto completoBrzobohatá, Veronika. "Vytvoření help desku SW nástroje pro řízení kybernetické bezpečnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444576.
Texto completoMiklau, Gerome. "Confidentiality and integrity in distributed data exchange /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.
Texto completo