Articoli di riviste sul tema "Database security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Database security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar e Supriya N. Deshpande. "Database Security". International Journal for Research in Applied Science and Engineering Technology 11, n. 4 (30 aprile 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Testo completoDenning, D. E. "Database Security". Annual Review of Computer Science 3, n. 1 (giugno 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Testo completoLunt, Teresa F., e Eduardo B. Fernandez. "Database security". ACM SIGMOD Record 19, n. 4 (dicembre 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Testo completoMorrison, Paul. "Database Security". Network Security 2003, n. 6 (giugno 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Testo completoParisi, Cameron, e Samantha Renicker. "Database security". Advances in Engineering Innovation 2, n. 1 (7 ottobre 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Testo completoSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar e Leon Jololian. "Database and database application security". ACM SIGCSE Bulletin 41, n. 3 (25 agosto 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Testo completoITAI, YAYA, AWODELE OLUDELE PhD e NICOLAE GOGA PhD. "Trigger and Database Security". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, n. 1 (1 febbraio 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Testo completoMamta Rani. "Database security at cache layer". International Journal of Science and Research Archive 9, n. 2 (30 luglio 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Testo completoMehta, Raju. "Oracle Database Security". Information Systems Security 13, n. 5 (novembre 2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.
Testo completoHarris, Duncan, e David Sidwell. "Distributed database security". Computers & Security 13, n. 7 (gennaio 1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.
Testo completoVishwakarma, Jaychand, e Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS". International Journal of Advanced Research in Computer Science and Software Engineering 8, n. 1 (30 gennaio 2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.
Testo completoAhmad, Khaleel, Mohammad Shoaib Alam e Nur Izura Udzir. "Security of NoSQL Database Against Intruders". Recent Patents on Engineering 13, n. 1 (8 febbraio 2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.
Testo completoAlshammari, Bandar M. "Security Assessment Model for Database Relational Designs". Journal of Medical Imaging and Health Informatics 9, n. 6 (1 agosto 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.
Testo completoMocean, Loredana, e Miranda-Petronella Vlad. "Database Security in RDF Terms". Scientific Bulletin 28, n. 1 (1 giugno 2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.
Testo completoPangalos, G. J. "Medical database security evaluation". Medical Informatics 18, n. 4 (gennaio 1993): 283–92. http://dx.doi.org/10.3109/14639239309025317.
Testo completoSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani e Amit Sharma. "Database Security using Cryptography". International Journal for Research in Applied Science and Engineering Technology 10, n. 6 (30 giugno 2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Testo completoPernul, G., e G. Luef. "Bibliography on database security". ACM SIGMOD Record 21, n. 1 (marzo 1992): 105–22. http://dx.doi.org/10.1145/130868.130884.
Testo completoPangalos, G. J. "Medical Database Security Policies". Methods of Information in Medicine 32, n. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.
Testo completoJajodia, Sushil. "Database security and privacy". ACM Computing Surveys 28, n. 1 (marzo 1996): 129–31. http://dx.doi.org/10.1145/234313.234370.
Testo completoMunro, Ken. "Database security — an oxymoron?" Infosecurity Today 3, n. 6 (novembre 2006): 42. http://dx.doi.org/10.1016/s1742-6847(06)70485-2.
Testo completoPangalos, G., M. Khair e L. Bozios. "Enhancing medical database security". Journal of Medical Systems 18, n. 4 (agosto 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Testo completoPan, Xueying, Anthony Obahiaghon, Brendan Makar, Samuel Wilson e Christian Beard. "Analysis of Database Security". OALib 11, n. 04 (2024): 1–19. http://dx.doi.org/10.4236/oalib.1111366.
Testo completoJasim, Khalid F., e Akram M. Zeki. "Design of Protection Software Using Some Cryptosystems for Cloud Database Files". Cihan University-Erbil Scientific Journal 8, n. 1 (30 giugno 2024): 70–79. http://dx.doi.org/10.24086/cuesj.v8n1y2024.pp70-79.
Testo completoP.J, Sankaranarayanan, e Geogen George. "Blockchain Based Aadhaar Security". International Journal of Engineering & Technology 7, n. 4.6 (25 settembre 2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.
Testo completoBAI, YUN, e YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY". International Journal of Pattern Recognition and Artificial Intelligence 18, n. 01 (febbraio 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.
Testo completoAlshammari, Ahmad. "Structuring and organizing database security domain from big data perspective using meta-modeling approach". International Journal of ADVANCED AND APPLIED SCIENCES 11, n. 2 (febbraio 2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.
Testo completoTeimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems". UHD Journal of Science and Technology 5, n. 2 (10 ottobre 2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.
Testo completoArputharaj J, Vijay, e Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security". INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, n. 1 (30 giugno 2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.
Testo completoHaikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan e Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33". Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, n. 2 (18 giugno 2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.
Testo completoLi, Dan Ning, Qi Li e Xin Qiang Ma. "Research of Security Mechanisms Based on LogicSQL Database". Applied Mechanics and Materials 155-156 (febbraio 2012): 352–56. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.352.
Testo completoAnsari, Sakil Ahmad, e Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems". International Journal of Advanced Research in Computer Science and Software Engineering 8, n. 4 (30 aprile 2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.
Testo completoSalman Rasheed Owaid. "Security of encrypted cloud database". Наука і техніка Повітряних Сил Збройних Сил України, n. 2(31) (27 aprile 2018): 122–30. http://dx.doi.org/10.30748/nitps.2018.31.16.
Testo completoMuhammad Sani, Habiba, e Muhammad Mika'ilu Yabo. "A Database System Security Framework". International Journal of Computer Science and Information Technology 7, n. 6 (31 dicembre 2015): 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.
Testo completoRM, Deepa. "Database Security with Fingerprint Masking". International Journal for Research in Applied Science and Engineering Technology 10, n. 7 (31 luglio 2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.
Testo completoDenning, D. E., S. G. Ak, M. Heckman, T. F. Lunt, M. Morgenstern, P. G. Neumann e R. R. Schell. "Views for Multilevel Database Security". IEEE Transactions on Software Engineering SE-13, n. 2 (febbraio 1987): 129–40. http://dx.doi.org/10.1109/tse.1987.232889.
Testo completoKang, Yue. "Legal Protection of Database Security". International Journal of Engineering Practical Research 4, n. 1 (2015): 38–41. http://dx.doi.org/10.12783/ijepr.2015.0401.08.
Testo completoYang, Li. "Teaching database security and auditing". ACM SIGCSE Bulletin 41, n. 1 (4 marzo 2009): 241–45. http://dx.doi.org/10.1145/1539024.1508954.
Testo completoSarmah, Simanta Shekhar. "Database Security –Threats & Prevention". International Journal of Computer Trends and Technology 67, n. 5 (25 maggio 2019): 46–53. http://dx.doi.org/10.14445/22312803/ijctt-v67i5p108.
Testo completoMaheshwari, Anil. "Database Security for the Web". Information Systems Management 16, n. 2 (marzo 1999): 85–88. http://dx.doi.org/10.1201/1078/43188.16.2.19990301/31181.13.
Testo completoJajodia, Sushil, e Duminda Wijesekera. "Security in Federated Database Systems". Information Security Technical Report 6, n. 2 (giugno 2001): 69–79. http://dx.doi.org/10.1016/s1363-4127(01)00208-4.
Testo completoHighland, Esther H. "An introduction to database security". Computers & Security 7, n. 3 (giugno 1988): 329. http://dx.doi.org/10.1016/0167-4048(88)90104-6.
Testo completoAvant, Deborah, e Kara Kingma Neu. "The Private Security Events Database". Journal of Conflict Resolution 63, n. 8 (30 gennaio 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.
Testo completoMa, Cai Xia, Wei Zhang, Zhi Gang Zhang e Yan Min Wang. "Oracle Database Security and Protection". Applied Mechanics and Materials 571-572 (giugno 2014): 586–90. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.586.
Testo completoBertino, Elisa, Sushil Jajodia e Pierangela Samarati. "Database security: Research and practice". Information Systems 20, n. 7 (novembre 1995): 537–56. http://dx.doi.org/10.1016/0306-4379(95)00029-4.
Testo completoMargaret Dumebi Okpor, Kizito Eluemunor Anazia e Daniel Ukpenusiowho. "A novel hybrid database security management technique". International Journal of Science and Research Archive 11, n. 2 (30 aprile 2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Testo completoStenin, Dmitriy, Natalya Stenina, Arman Akanov e Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes". E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.
Testo completoS R V Satish, Karuturi. "Database Security Issues and Challenges in Cloud Computing". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 11 (5 aprile 2024): 937–43. http://dx.doi.org/10.17762/ijritcc.v11i11.10396.
Testo completoMaulana, Dimas Krisna, Sunilfa Maharani Tanjung, Reni Septiani Ritonga e Ali Ikhwan. "Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi". Jurnal Sains dan Teknologi (JSIT) 3, n. 1 (15 gennaio 2023): 47–52. http://dx.doi.org/10.47233/jsit.v3i1.483.
Testo completoHashim, Hassan Bediar. "Challenges and Security Vulnerabilities to Impact on Database Systems". Al-Mustansiriyah Journal of Science 29, n. 2 (17 novembre 2018): 117. http://dx.doi.org/10.23851/mjs.v29i2.332.
Testo completoKEKÜL, Hakan, Burhan ERGEN e Halil ARSLAN. "Estimating Missing Security Vectors in NVD Database Security Reports". International Journal of Engineering and Manufacturing 12, n. 3 (8 giugno 2022): 1–13. http://dx.doi.org/10.5815/ijem.2022.03.01.
Testo completo