Letteratura scientifica selezionata sul tema "Database security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Database security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Database security"
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar e Supriya N. Deshpande. "Database Security". International Journal for Research in Applied Science and Engineering Technology 11, n. 4 (30 aprile 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Testo completoDenning, D. E. "Database Security". Annual Review of Computer Science 3, n. 1 (giugno 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Testo completoLunt, Teresa F., e Eduardo B. Fernandez. "Database security". ACM SIGMOD Record 19, n. 4 (dicembre 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Testo completoMorrison, Paul. "Database Security". Network Security 2003, n. 6 (giugno 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Testo completoParisi, Cameron, e Samantha Renicker. "Database security". Advances in Engineering Innovation 2, n. 1 (7 ottobre 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Testo completoSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar e Leon Jololian. "Database and database application security". ACM SIGCSE Bulletin 41, n. 3 (25 agosto 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Testo completoITAI, YAYA, AWODELE OLUDELE PhD e NICOLAE GOGA PhD. "Trigger and Database Security". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, n. 1 (1 febbraio 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Testo completoMamta Rani. "Database security at cache layer". International Journal of Science and Research Archive 9, n. 2 (30 luglio 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Testo completoMehta, Raju. "Oracle Database Security". Information Systems Security 13, n. 5 (novembre 2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.
Testo completoHarris, Duncan, e David Sidwell. "Distributed database security". Computers & Security 13, n. 7 (gennaio 1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.
Testo completoTesi sul tema "Database security"
Sakhi, Imal. "Database security in the cloud". Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Testo completoChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases". online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Testo completoWong, Wai-kit, e 王偉傑. "Security and computability in database applications". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Testo completoKong, Yibing. "Security and privacy model for association databases". Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Testo completoHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Testo completoChen, Yu. "Protection of database security via collaborative inference detection". Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Testo completoBernagozzi, Stefano. "Range Queries on an encrypted outsourced database". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Testo completoPokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Testo completoHo, Sze-lok, e 何思樂. "Technical solutions for conducting investigations in digital age". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Testo completopublished_or_final_version
Computer Science
Master
Master of Philosophy
Zhang, Ye, e 张叶. "Query and access control over encrypted databases". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Testo completoLibri sul tema "Database security"
Silvana, Castano, a cura di. Database security. New York, N.Y: ACM Press, 1995.
Cerca il testo completoSamarati, Pierangela, e Ravi S. Sandhu, a cura di. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Testo completoMelissa, Zgola, e Bullaboy Dana, a cura di. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Cerca il testo completoSpooner, David L., Steven A. Demurjian e John E. Dobson, a cura di. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Testo completoLin, T. Y., e Shelly Qian, a cura di. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Testo completoJajodia, Sushil, a cura di. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Testo completoMustafa, Osama, e Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Testo completoGertz, Michael, e Sushil Jajodia, a cura di. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Testo completoF, Lunt Teresa, e Rome Air Development Center, a cura di. Research directionsin database security. New York: Springer-Verlag, 1992.
Cerca il testo completo1950-, Bond Rebecca, a cura di. Understanding DB2 9 security. Upper Saddle River, NJ: IBM Press/Pearson, 2007.
Cerca il testo completoCapitoli di libri sul tema "Database security"
Willis, Thearon. "Database Security". In Practical Database Design for the Web, 176–94. Berkeley, CA: Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5377-8_8.
Testo completoMalcher, Michelle. "Database Security". In DBA Transformations, 69–82. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3243-9_6.
Testo completoBertino, Elisa, Ji-Won Byun e Ashish Kamra. "Database Security". In Security, Privacy, and Trust in Modern Data Management, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_7.
Testo completoFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 728–32. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_111.
Testo completoFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_111-2.
Testo completoFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 974–79. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_111.
Testo completoKaufmann, Michael, e Andreas Meier. "Database Security". In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.
Testo completoLunt, Teresa F. "Strategic Directions in Computer Security Research". In Database Security, 3–10. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Testo completoSandhu, Ravi, e John Campbell. "Open Issues in Database Security". In Database Security, 169–73. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_10.
Testo completoJajodia, Sushil, Luigi V. Mancini e Indrajit Ray. "Secure Locking Protocols for Multilevel Database Management Systems". In Database Security, 177–94. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_11.
Testo completoAtti di convegni sul tema "Database security"
Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar e Leon Jololian. "Database and database application security". In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562909.
Testo completoBeaubouef, Theresa, e Frederick E. Petry. "Database security issues in rough relational databases". In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.
Testo completoGuimaraes, Mario, Meg Murray e Richard Austin. "Incorporating database security courseware into a database security class". In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409914.
Testo completoCinar, Onur, R. Haluk Guncer e Adnan Yazici. "Database Security in Private Database Clouds". In 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016. http://dx.doi.org/10.1109/icissec.2016.7885847.
Testo completoAwodiji, Temitope. "Database Security in a Dynamic IT world". In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.
Testo completoBlake, Errol A. "Network and database security". In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409937.
Testo completoSingh, Prabhsimran, e Kuljit Kaur. "Database security using encryption". In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155019.
Testo completoGuimaraes, Mario A. M., Richard Austin e Huwida Said. "Database forensics". In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940958.
Testo completoJoo, Hankyu. "Practical Database Encryption Scheme for Database-as-a-Service". In Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.93.08.
Testo completoDenning, Dorothy E., Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell e Mark Heckman. "Views for Multilevel Database Security". In 1986 IEEE Symposium on Security and Privacy. IEEE, 1986. http://dx.doi.org/10.1109/sp.1986.10012.
Testo completoRapporti di organizzazioni sul tema "Database security"
Baer, M., R. Charlet, W. Hardaker, R. Story e C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, marzo 2007. http://dx.doi.org/10.17487/rfc4807.
Testo completoBurns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, luglio 1993. http://dx.doi.org/10.21236/ada268885.
Testo completoLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, marzo 1991. http://dx.doi.org/10.21236/ada237573.
Testo completoPolk, W. Timothy, e Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.
Testo completoKang, Myong H., Judith N. Froscher, John McDermott, Oliver Costich e Rodney Peyton. Achieving Database Security Through Data Replication: The Sintra Prototype. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1994. http://dx.doi.org/10.21236/ada464289.
Testo completoNotargiacomo, LouAnna, e Teresa Lunt. Research Directions in Database Security VI: Proceedings of the Rome Laboratory Multilevel Database Security Workshop (6th) Held at the Southwest Harbor, Maine on 22-24 June 1994. Fort Belvoir, VA: Defense Technical Information Center, settembre 1995. http://dx.doi.org/10.21236/ada300794.
Testo completoDe Paula, Everton G., e Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, febbraio 1991. http://dx.doi.org/10.21236/ada235448.
Testo completoCarpenter, R., e D. Sweeney. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits. Office of Scientific and Technical Information (OSTI), marzo 1995. http://dx.doi.org/10.2172/86892.
Testo completoPerlo-Freeman, Sam, Elisabeth Sköns, Carina Solmirano e Helen Wilandh. Trends in World Military Expenditure, 2012. Stockholm International Peace Research Institute, aprile 2013. http://dx.doi.org/10.55163/mqgg1283.
Testo completoMITRE CORP BEDFORD MA. Proceedings of the IFIP WG 11.3 Working Conference on Database Security (6th) Held in Vancouver, British Columbia on 19-22 August 1992. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1992. http://dx.doi.org/10.21236/ada298828.
Testo completo