Literatura científica selecionada sobre o tema "Database security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Database security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Database security"
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar e Supriya N. Deshpande. "Database Security". International Journal for Research in Applied Science and Engineering Technology 11, n.º 4 (30 de abril de 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Texto completo da fonteDenning, D. E. "Database Security". Annual Review of Computer Science 3, n.º 1 (junho de 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Texto completo da fonteLunt, Teresa F., e Eduardo B. Fernandez. "Database security". ACM SIGMOD Record 19, n.º 4 (dezembro de 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Texto completo da fonteMorrison, Paul. "Database Security". Network Security 2003, n.º 6 (junho de 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Texto completo da fonteParisi, Cameron, e Samantha Renicker. "Database security". Advances in Engineering Innovation 2, n.º 1 (7 de outubro de 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Texto completo da fonteSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar e Leon Jololian. "Database and database application security". ACM SIGCSE Bulletin 41, n.º 3 (25 de agosto de 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Texto completo da fonteITAI, YAYA, AWODELE OLUDELE PhD e NICOLAE GOGA PhD. "Trigger and Database Security". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, n.º 1 (1 de fevereiro de 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Texto completo da fonteMamta Rani. "Database security at cache layer". International Journal of Science and Research Archive 9, n.º 2 (30 de julho de 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Texto completo da fonteMehta, Raju. "Oracle Database Security". Information Systems Security 13, n.º 5 (novembro de 2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.
Texto completo da fonteHarris, Duncan, e David Sidwell. "Distributed database security". Computers & Security 13, n.º 7 (janeiro de 1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.
Texto completo da fonteTeses / dissertações sobre o assunto "Database security"
Sakhi, Imal. "Database security in the cloud". Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Texto completo da fonteChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases". online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Texto completo da fonteWong, Wai-kit, e 王偉傑. "Security and computability in database applications". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Texto completo da fonteKong, Yibing. "Security and privacy model for association databases". Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Texto completo da fonteHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Texto completo da fonteChen, Yu. "Protection of database security via collaborative inference detection". Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Texto completo da fonteBernagozzi, Stefano. "Range Queries on an encrypted outsourced database". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Texto completo da fontePokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Texto completo da fonteHo, Sze-lok, e 何思樂. "Technical solutions for conducting investigations in digital age". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Texto completo da fontepublished_or_final_version
Computer Science
Master
Master of Philosophy
Zhang, Ye, e 张叶. "Query and access control over encrypted databases". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Texto completo da fonteLivros sobre o assunto "Database security"
Samarati, Pierangela, e Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Texto completo da fonteMelissa, Zgola, e Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Encontre o texto completo da fonteSilvana, Castano, ed. Database security. New York, N.Y: ACM Press, 1995.
Encontre o texto completo da fonteSpooner, David L., Steven A. Demurjian e John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Texto completo da fonteLin, T. Y., e Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Texto completo da fonteJajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Texto completo da fonteMustafa, Osama, e Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Texto completo da fonteGertz, Michael, e Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Texto completo da fonteF, Lunt Teresa, e Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.
Encontre o texto completo da fonteIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Database security"
Willis, Thearon. "Database Security". In Practical Database Design for the Web, 176–94. Berkeley, CA: Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5377-8_8.
Texto completo da fonteMalcher, Michelle. "Database Security". In DBA Transformations, 69–82. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3243-9_6.
Texto completo da fonteBertino, Elisa, Ji-Won Byun e Ashish Kamra. "Database Security". In Security, Privacy, and Trust in Modern Data Management, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_7.
Texto completo da fonteFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 728–32. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_111.
Texto completo da fonteFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_111-2.
Texto completo da fonteFerrari, Elena. "Database Security". In Encyclopedia of Database Systems, 974–79. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_111.
Texto completo da fonteKaufmann, Michael, e Andreas Meier. "Database Security". In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.
Texto completo da fonteLunt, Teresa F. "Strategic Directions in Computer Security Research". In Database Security, 3–10. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Texto completo da fonteSandhu, Ravi, e John Campbell. "Open Issues in Database Security". In Database Security, 169–73. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_10.
Texto completo da fonteJajodia, Sushil, Luigi V. Mancini e Indrajit Ray. "Secure Locking Protocols for Multilevel Database Management Systems". In Database Security, 177–94. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_11.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Database security"
Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar e Leon Jololian. "Database and database application security". In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562909.
Texto completo da fonteBeaubouef, Theresa, e Frederick E. Petry. "Database security issues in rough relational databases". In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.
Texto completo da fonteGuimaraes, Mario, Meg Murray e Richard Austin. "Incorporating database security courseware into a database security class". In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409914.
Texto completo da fonteCinar, Onur, R. Haluk Guncer e Adnan Yazici. "Database Security in Private Database Clouds". In 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016. http://dx.doi.org/10.1109/icissec.2016.7885847.
Texto completo da fonteAwodiji, Temitope. "Database Security in a Dynamic IT world". In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.
Texto completo da fonteBlake, Errol A. "Network and database security". In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409937.
Texto completo da fonteSingh, Prabhsimran, e Kuljit Kaur. "Database security using encryption". In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155019.
Texto completo da fonteGuimaraes, Mario A. M., Richard Austin e Huwida Said. "Database forensics". In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940958.
Texto completo da fonteJoo, Hankyu. "Practical Database Encryption Scheme for Database-as-a-Service". In Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.93.08.
Texto completo da fonteDenning, Dorothy E., Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell e Mark Heckman. "Views for Multilevel Database Security". In 1986 IEEE Symposium on Security and Privacy. IEEE, 1986. http://dx.doi.org/10.1109/sp.1986.10012.
Texto completo da fonteRelatórios de organizações sobre o assunto "Database security"
Baer, M., R. Charlet, W. Hardaker, R. Story e C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, março de 2007. http://dx.doi.org/10.17487/rfc4807.
Texto completo da fonteBurns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, julho de 1993. http://dx.doi.org/10.21236/ada268885.
Texto completo da fonteLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, março de 1991. http://dx.doi.org/10.21236/ada237573.
Texto completo da fontePolk, W. Timothy, e Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.
Texto completo da fonteKang, Myong H., Judith N. Froscher, John McDermott, Oliver Costich e Rodney Peyton. Achieving Database Security Through Data Replication: The Sintra Prototype. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1994. http://dx.doi.org/10.21236/ada464289.
Texto completo da fonteNotargiacomo, LouAnna, e Teresa Lunt. Research Directions in Database Security VI: Proceedings of the Rome Laboratory Multilevel Database Security Workshop (6th) Held at the Southwest Harbor, Maine on 22-24 June 1994. Fort Belvoir, VA: Defense Technical Information Center, setembro de 1995. http://dx.doi.org/10.21236/ada300794.
Texto completo da fonteDe Paula, Everton G., e Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 1991. http://dx.doi.org/10.21236/ada235448.
Texto completo da fonteCarpenter, R., e D. Sweeney. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits. Office of Scientific and Technical Information (OSTI), março de 1995. http://dx.doi.org/10.2172/86892.
Texto completo da fontePerlo-Freeman, Sam, Elisabeth Sköns, Carina Solmirano e Helen Wilandh. Trends in World Military Expenditure, 2012. Stockholm International Peace Research Institute, abril de 2013. http://dx.doi.org/10.55163/mqgg1283.
Texto completo da fonteMITRE CORP BEDFORD MA. Proceedings of the IFIP WG 11.3 Working Conference on Database Security (6th) Held in Vancouver, British Columbia on 19-22 August 1992. Fort Belvoir, VA: Defense Technical Information Center, janeiro de 1992. http://dx.doi.org/10.21236/ada298828.
Texto completo da fonte