Letteratura scientifica selezionata sul tema "Database security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Database security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Database security"
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar e Supriya N. Deshpande. "Database Security". International Journal for Research in Applied Science and Engineering Technology 11, n. 4 (30 aprile 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Testo completoDenning, D. E. "Database Security". Annual Review of Computer Science 3, n. 1 (giugno 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Testo completoLunt, Teresa F., e Eduardo B. Fernandez. "Database security". ACM SIGMOD Record 19, n. 4 (dicembre 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Testo completoMorrison, Paul. "Database Security". Network Security 2003, n. 6 (giugno 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Testo completoParisi, Cameron, e Samantha Renicker. "Database security". Advances in Engineering Innovation 2, n. 1 (7 ottobre 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Testo completoSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar e Leon Jololian. "Database and database application security". ACM SIGCSE Bulletin 41, n. 3 (25 agosto 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Testo completoITAI, YAYA, AWODELE OLUDELE PhD e NICOLAE GOGA PhD. "Trigger and Database Security". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, n. 1 (1 febbraio 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Testo completoMamta Rani. "Database security at cache layer". International Journal of Science and Research Archive 9, n. 2 (30 luglio 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Testo completoMehta, Raju. "Oracle Database Security". Information Systems Security 13, n. 5 (novembre 2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.
Testo completoHarris, Duncan, e David Sidwell. "Distributed database security". Computers & Security 13, n. 7 (gennaio 1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.
Testo completoTesi sul tema "Database security"
Sakhi, Imal. "Database security in the cloud". Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Testo completoChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases". online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Testo completoWong, Wai-kit, e 王偉傑. "Security and computability in database applications". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Testo completoKong, Yibing. "Security and privacy model for association databases". Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Testo completoHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Testo completoChen, Yu. "Protection of database security via collaborative inference detection". Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Testo completoBernagozzi, Stefano. "Range Queries on an encrypted outsourced database". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Testo completoPokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Testo completoHo, Sze-lok, e 何思樂. "Technical solutions for conducting investigations in digital age". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Testo completopublished_or_final_version
Computer Science
Master
Master of Philosophy
Zhang, Ye, e 张叶. "Query and access control over encrypted databases". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Testo completoLibri sul tema "Database security"
Samarati, Pierangela, e Ravi S. Sandhu, a cura di. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Testo completoMelissa, Zgola, e Bullaboy Dana, a cura di. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Cerca il testo completoSilvana, Castano, a cura di. Database security. New York, N.Y: ACM Press, 1995.
Cerca il testo completoSpooner, David L., Steven A. Demurjian e John E. Dobson, a cura di. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Testo completoLin, T. Y., e Shelly Qian, a cura di. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Testo completoJajodia, Sushil, a cura di. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Testo completoMustafa, Osama, e Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Testo completoGertz, Michael, e Sushil Jajodia, a cura di. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Testo completoF, Lunt Teresa, e Rome Air Development Center, a cura di. Research directionsin database security. New York: Springer-Verlag, 1992.
Cerca il testo completoIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Cerca il testo completoCapitoli di libri sul tema "Database security"
Willis, Thearon. "Database Security". In Practical Database Design for the Web, 176–94. Berkeley, CA: Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5377-8_8.
Testo completoMalcher, Michelle. "Database Security". In DBA Transformations, 69–82. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3243-9_6.
Testo completoBertino, Elisa, Ji-Won Byun e Ashish Kamra. "Database Security". In Security, Privacy, and Trust in Modern Data Management, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_7.
Testo completoFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 728–32. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_111.
Testo completoFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_111-2.
Testo completoFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 974–79. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_111.
Testo completoKaufmann, Michael, e Andreas Meier. "Database Security". In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.
Testo completoLunt, Teresa F. "Strategic Directions in Computer Security Research". In Database Security, 3–10. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Testo completoSandhu, Ravi, e John Campbell. "Open Issues in Database Security". In Database Security, 169–73. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_10.
Testo completoJajodia, Sushil, Luigi V. Mancini e Indrajit Ray. "Secure Locking Protocols for Multilevel Database Management Systems". In Database Security, 177–94. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_11.
Testo completoAtti di convegni sul tema "Database security"
Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar e Leon Jololian. "Database and database application security". In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562909.
Testo completoBeaubouef, Theresa, e Frederick E. Petry. "Database security issues in rough relational databases". In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.
Testo completoGuimaraes, Mario, Meg Murray e Richard Austin. "Incorporating database security courseware into a database security class". In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409914.
Testo completoCinar, Onur, R. Haluk Guncer e Adnan Yazici. "Database Security in Private Database Clouds". In 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016. http://dx.doi.org/10.1109/icissec.2016.7885847.
Testo completoAwodiji, Temitope. "Database Security in a Dynamic IT world". In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.
Testo completoBlake, Errol A. "Network and database security". In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409937.
Testo completoSingh, Prabhsimran, e Kuljit Kaur. "Database security using encryption". In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155019.
Testo completoGuimaraes, Mario A. M., Richard Austin e Huwida Said. "Database forensics". In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940958.
Testo completoJoo, Hankyu. "Practical Database Encryption Scheme for Database-as-a-Service". In Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.93.08.
Testo completoDenning, Dorothy E., Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell e Mark Heckman. "Views for Multilevel Database Security". In 1986 IEEE Symposium on Security and Privacy. IEEE, 1986. http://dx.doi.org/10.1109/sp.1986.10012.
Testo completoRapporti di organizzazioni sul tema "Database security"
Baer, M., R. Charlet, W. Hardaker, R. Story e C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, marzo 2007. http://dx.doi.org/10.17487/rfc4807.
Testo completoBurns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, luglio 1993. http://dx.doi.org/10.21236/ada268885.
Testo completoLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, marzo 1991. http://dx.doi.org/10.21236/ada237573.
Testo completoPolk, W. Timothy, e Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.
Testo completoKang, Myong H., Judith N. Froscher, John McDermott, Oliver Costich e Rodney Peyton. Achieving Database Security Through Data Replication: The Sintra Prototype. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1994. http://dx.doi.org/10.21236/ada464289.
Testo completoNotargiacomo, LouAnna, e Teresa Lunt. Research Directions in Database Security VI: Proceedings of the Rome Laboratory Multilevel Database Security Workshop (6th) Held at the Southwest Harbor, Maine on 22-24 June 1994. Fort Belvoir, VA: Defense Technical Information Center, settembre 1995. http://dx.doi.org/10.21236/ada300794.
Testo completoDe Paula, Everton G., e Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, febbraio 1991. http://dx.doi.org/10.21236/ada235448.
Testo completoCarpenter, R., e D. Sweeney. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits. Office of Scientific and Technical Information (OSTI), marzo 1995. http://dx.doi.org/10.2172/86892.
Testo completoPerlo-Freeman, Sam, Elisabeth Sköns, Carina Solmirano e Helen Wilandh. Trends in World Military Expenditure, 2012. Stockholm International Peace Research Institute, aprile 2013. http://dx.doi.org/10.55163/mqgg1283.
Testo completoMITRE CORP BEDFORD MA. Proceedings of the IFIP WG 11.3 Working Conference on Database Security (6th) Held in Vancouver, British Columbia on 19-22 August 1992. Fort Belvoir, VA: Defense Technical Information Center, gennaio 1992. http://dx.doi.org/10.21236/ada298828.
Testo completo