Articoli di riviste sul tema "Databases security"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Databases security".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar e Supriya N. Deshpande. "Database Security". International Journal for Research in Applied Science and Engineering Technology 11, n. 4 (30 aprile 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Testo completoAhmad, Khaleel, Mohammad Shoaib Alam e Nur Izura Udzir. "Security of NoSQL Database Against Intruders". Recent Patents on Engineering 13, n. 1 (8 febbraio 2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.
Testo completoLysetskyi, Yu M., e D. Y. Kalbazov. "Information security of corporate databases". Mathematical machines and systems 3 (2023): 31–37. http://dx.doi.org/10.34121/1028-9763-2023-3-31-37.
Testo completoHaikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan e Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33". Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, n. 2 (18 giugno 2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.
Testo completoKyrychenko, I. V., О. S. Nazarov, I. V. Gruzdo e N. Kozel. "SECURITY IN DECENTRALIZED DATABASES". Bionics of Intelligence 1, n. 92 (2 giugno 2019): 59–64. http://dx.doi.org/10.30837/bi.2019.1(92).10.
Testo completoNeto, Afonso Araújo, e Marco Vieira. "Security Gaps in Databases". International Journal of Secure Software Engineering 2, n. 3 (luglio 2011): 42–62. http://dx.doi.org/10.4018/jsse.2011070103.
Testo completoPernul, G., e A. M. Tjoa. "Security Policies for Databases". IFAC Proceedings Volumes 25, n. 30 (ottobre 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.
Testo completoThuraisingham, Bhavani. "Security for Distributed Databases". Information Security Technical Report 6, n. 2 (giugno 2001): 95–102. http://dx.doi.org/10.1016/s1363-4127(01)00210-2.
Testo completoTeimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems". UHD Journal of Science and Technology 5, n. 2 (10 ottobre 2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.
Testo completoArputharaj J, Vijay, e Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security". INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, n. 1 (30 giugno 2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.
Testo completoVishwakarma, Jaychand, e Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS". International Journal of Advanced Research in Computer Science and Software Engineering 8, n. 1 (30 gennaio 2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.
Testo completoMamta Rani. "Database security at cache layer". International Journal of Science and Research Archive 9, n. 2 (30 luglio 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Testo completoGudriks, Rinalds, e Sergejs Kodors. "POSTGRESQL DATABASES SECURITY CONFIGURATION CHECKLIST". HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, n. 23 (24 aprile 2019): 38. http://dx.doi.org/10.17770/het2019.23.4386.
Testo completoYerkey, A. Neil. "Security of Microsoft Access Databases". Library & Archival Security 17, n. 2 (marzo 2001): 29–43. http://dx.doi.org/10.1300/j114v17n02_04.
Testo completoHenley, Stephen. "Project databases: standards and security". Geological Society, London, Special Publications 97, n. 1 (1995): 97–101. http://dx.doi.org/10.1144/gsl.sp.1995.097.01.12.
Testo completoLipton, J. D. "Security Interests in Electronic Databases". International Journal of Law and Information Technology 9, n. 1 (1 marzo 2001): 65–86. http://dx.doi.org/10.1093/ijlit/9.1.65.
Testo completoAhlswede, R., e H. Aydinian. "On Security of Statistical Databases". SIAM Journal on Discrete Mathematics 25, n. 4 (gennaio 2011): 1778–91. http://dx.doi.org/10.1137/070689589.
Testo completoLaferriere, Claude, G. Owen Higginson e Gordon G. Bell. "Security architectures for textual databases". Computers & Security 9, n. 7 (novembre 1990): 621–30. http://dx.doi.org/10.1016/0167-4048(90)90061-w.
Testo completoHashim, Hassan Bediar. "Challenges and Security Vulnerabilities to Impact on Database Systems". Al-Mustansiriyah Journal of Science 29, n. 2 (17 novembre 2018): 117. http://dx.doi.org/10.23851/mjs.v29i2.332.
Testo completoITAI, YAYA, AWODELE OLUDELE PhD e NICOLAE GOGA PhD. "Trigger and Database Security". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, n. 1 (1 febbraio 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Testo completoP.J, Sankaranarayanan, e Geogen George. "Blockchain Based Aadhaar Security". International Journal of Engineering & Technology 7, n. 4.6 (25 settembre 2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.
Testo completoS R V Satish, Karuturi. "Database Security Issues and Challenges in Cloud Computing". International Journal on Recent and Innovation Trends in Computing and Communication 11, n. 11 (5 aprile 2024): 937–43. http://dx.doi.org/10.17762/ijritcc.v11i11.10396.
Testo completoMocean, Loredana, e Miranda-Petronella Vlad. "Database Security in RDF Terms". Scientific Bulletin 28, n. 1 (1 giugno 2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.
Testo completoNICA, ELVIRA, BOGDAN GEORGE TUDORICA, DOREL-MIHAIL DUSMANESCU, GHEORGHE POPESCU e ALINA MARIA BREAZ. "Databases Security Issues - A Short Analysis on the Emergent Security Problems Generated By NoSQL Databases". ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH 53, n. 3/2019 (21 settembre 2019): 113–29. http://dx.doi.org/10.24818/18423264/53.3.19.07.
Testo completoChen, Ailin, Shaoyuan Yu, Xinyi Yang, Ding Huang e Yongjun Ren. "IoT data security in outsourced databases: A survey of verifiable database". Heliyon 10, n. 7 (aprile 2024): e28117. http://dx.doi.org/10.1016/j.heliyon.2024.e28117.
Testo completoStenin, Dmitriy, Natalya Stenina, Arman Akanov e Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes". E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.
Testo completoAshwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza, Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza. "Access Control Models in NoSQL Databases: An Overview". journal of king abdulaziz university computing and information technology sciences 8, n. 1 (10 marzo 2019): 1–9. http://dx.doi.org/10.4197/comp.8-1.1.
Testo completoAlshammari, Bandar M. "Security Assessment Model for Database Relational Designs". Journal of Medical Imaging and Health Informatics 9, n. 6 (1 agosto 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.
Testo completoAgarwal, Archita, Maurice Herlihy, Seny Kamara e Tarik Moataz. "Encrypted Databases for Differential Privacy". Proceedings on Privacy Enhancing Technologies 2019, n. 3 (1 luglio 2019): 170–90. http://dx.doi.org/10.2478/popets-2019-0042.
Testo completoYesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura e Stanislaw A. Rajba. "Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model". Applied Sciences 11, n. 23 (25 novembre 2021): 11175. http://dx.doi.org/10.3390/app112311175.
Testo completoAlshammari, Ahmad. "Structuring and organizing database security domain from big data perspective using meta-modeling approach". International Journal of ADVANCED AND APPLIED SCIENCES 11, n. 2 (febbraio 2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.
Testo completoVilihura, Vladislav, Yuriy Gorbenko, Vitaliy Yesin e Serhiy Rassomakhin. "Using formal security models in secure databases". Physico-mathematical modelling and informational technologies, n. 32 (7 luglio 2021): 70–74. http://dx.doi.org/10.15407/fmmit2021.32.070.
Testo completoDempsey, B. J., e J. Herrin. "WEB-Enabled Medical Databases: a Threat to Security?" Methods of Information in Medicine 39, n. 04/05 (2000): 298–302. http://dx.doi.org/10.1055/s-0038-1634448.
Testo completoJamali, Mujeeb-ur-Rehman, Najma Imtiaz Ali, Imtiaz Ali Brohi, Muhammad Umar Murad, Yasir Nawaz e Uswa Urooj. "An Empirical Evaluation of Data Integrity Algorithm Performance in Non-Relational Document Databases". VAWKUM Transactions on Computer Sciences 11, n. 2 (8 dicembre 2023): 70–82. http://dx.doi.org/10.21015/vtcs.v11i2.1663.
Testo completoKunda, Douglas, e Hazael Phiri. "A Comparative Study of NoSQL and Relational Database". Zambia ICT Journal 1, n. 1 (11 dicembre 2017): 1–4. http://dx.doi.org/10.33260/zictjournal.v1i1.8.
Testo completoLarchenko, Maryna. "MODERN PROBLEMS OF CRYPTOGRAPHIC PROTECTION OF DATABASES". Technical Sciences and Technologies, n. 3(29) (2022): 102–13. http://dx.doi.org/10.25140/2411-5363-2022-3(29)-102-113.
Testo completoLi, Guoliang, Haowen Dong e Chao Zhang. "Cloud databases". Proceedings of the VLDB Endowment 15, n. 12 (agosto 2022): 3758–61. http://dx.doi.org/10.14778/3554821.3554893.
Testo completoŚlęzak, Łukasz, e Jarosław Butanowicz. "Security of Statistical Databases as an element of Enterprise Security Architecture". Computer Science and Mathematical Modelling 13, n. 13 (30 dicembre 2014): 37–44. http://dx.doi.org/10.5604/15084183.1136516.
Testo completoGele, Aori. "Study on the Security of the Databases in Cloud Computing Environment". Applied Mechanics and Materials 443 (ottobre 2013): 473–76. http://dx.doi.org/10.4028/www.scientific.net/amm.443.473.
Testo completoPoltavtsev, A. A., A. R. Khabarov e A. O. Selyankin. "Inference Attacks and Information Security in Databases". Automatic Control and Computer Sciences 54, n. 8 (dicembre 2020): 829–33. http://dx.doi.org/10.3103/s0146411620080271.
Testo completoM., Monisha, Narmathadevi V. e D. Kerana Hanirex. "Enhancing Security and Consistency for Cloud Databases". Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, n. 3 (31 marzo 2015): 49–63. http://dx.doi.org/10.53555/nncse.v2i3.488.
Testo completoAgrawal, D. "Integrating Security with Fault-tolerant Distributed Databases". Computer Journal 33, n. 1 (1 gennaio 1990): 71–78. http://dx.doi.org/10.1093/comjnl/33.1.71.
Testo completoHansen, Steven C. "Hybrid inferential security methods for statistical databases". ACM SIGAPP Applied Computing Review 3, n. 1 (20 giugno 1995): 14–18. http://dx.doi.org/10.1145/214310.214433.
Testo completoThuraisingham, Bhavani. "Security and Privacy Issues for Sensor Databases". Sensor Letters 2, n. 1 (1 marzo 2004): 37–47. http://dx.doi.org/10.1166/sl.2004.022.
Testo completoMariuţa, Şerban. "Principles of Security and Integrity of Databases". Procedia Economics and Finance 15 (2014): 401–5. http://dx.doi.org/10.1016/s2212-5671(14)00465-1.
Testo completoDoyle, Sean D. "The Security, Audit and Control of Databases". Computer Fraud & Security Bulletin 1992, n. 3 (marzo 1992): 17–18. http://dx.doi.org/10.1016/0142-0496(92)90221-4.
Testo completoPaniagua Diez, Fidel, Amrutha Chikkanayakanahalli Vasu, Diego Suarez Touceda e Jose Maria Sierra Camara. "Modeling XACML Security Policies Using Graph Databases". IT Professional 19, n. 6 (novembre 2017): 52–57. http://dx.doi.org/10.1109/mitp.2017.4241465.
Testo completoDavid, Baptiste, Dorian Larget e Thibaut Scherrer. "The security of databases: the Access case". Journal of Computer Virology and Hacking Techniques 9, n. 2 (12 marzo 2013): 95–107. http://dx.doi.org/10.1007/s11416-013-0182-7.
Testo completoKarpisz, Dariusz, Anna Kiełbus e Maryna Zembytska. "Selected Problems of Industry Databases and Information Infrastructure Security". Quality Production Improvement - QPI 1, n. 1 (1 luglio 2019): 371–77. http://dx.doi.org/10.2478/cqpi-2019-0050.
Testo completoSubach, I., e O. Vlasenko. "Architecture of intelligent SIEM for detecting cyber incidents in databases of military information and communication systems." Communication, informatization and cybersecurity systems and technologies, n. 4 (21 dicembre 2023): 82–92. http://dx.doi.org/10.58254/viti.4.2023.07.82.
Testo completo