Статті в журналах з теми "Database security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Database security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Denning, D. E. "Database Security." Annual Review of Computer Science 3, no. 1 (June 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Lunt, Teresa F., and Eduardo B. Fernandez. "Database security." ACM SIGMOD Record 19, no. 4 (December 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Morrison, Paul. "Database Security." Network Security 2003, no. 6 (June 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
ITAI, YAYA, AWODELE OLUDELE PhD, and NICOLAE GOGA PhD. "Trigger and Database Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (February 1, 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Mamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (July 30, 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Mehta, Raju. "Oracle Database Security." Information Systems Security 13, no. 5 (November 2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.
Harris, Duncan, and David Sidwell. "Distributed database security." Computers & Security 13, no. 7 (January 1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.
Vishwakarma, Jaychand, and Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.
Ahmad, Khaleel, Mohammad Shoaib Alam, and Nur Izura Udzir. "Security of NoSQL Database Against Intruders." Recent Patents on Engineering 13, no. 1 (February 8, 2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.
Alshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.
Mocean, Loredana, and Miranda-Petronella Vlad. "Database Security in RDF Terms." Scientific Bulletin 28, no. 1 (June 1, 2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.
Pangalos, G. J. "Medical database security evaluation." Medical Informatics 18, no. 4 (January 1993): 283–92. http://dx.doi.org/10.3109/14639239309025317.
Singhal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Pernul, G., and G. Luef. "Bibliography on database security." ACM SIGMOD Record 21, no. 1 (March 1992): 105–22. http://dx.doi.org/10.1145/130868.130884.
Pangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.
Jajodia, Sushil. "Database security and privacy." ACM Computing Surveys 28, no. 1 (March 1996): 129–31. http://dx.doi.org/10.1145/234313.234370.
Munro, Ken. "Database security — an oxymoron?" Infosecurity Today 3, no. 6 (November 2006): 42. http://dx.doi.org/10.1016/s1742-6847(06)70485-2.
Pangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
BAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.
P.J, Sankaranarayanan, and Geogen George. "Blockchain Based Aadhaar Security." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.
Arputharaj J, Vijay, and Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 1 (June 30, 2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.
Teimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems." UHD Journal of Science and Technology 5, no. 2 (October 10, 2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.
Haikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, and Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (June 18, 2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.
Ansari, Sakil Ahmad, and Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (April 30, 2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.
Li, Dan Ning, Qi Li, and Xin Qiang Ma. "Research of Security Mechanisms Based on LogicSQL Database." Applied Mechanics and Materials 155-156 (February 2012): 352–56. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.352.
Salman Rasheed Owaid. "Security of encrypted cloud database." Наука і техніка Повітряних Сил Збройних Сил України, no. 2(31) (April 27, 2018): 122–30. http://dx.doi.org/10.30748/nitps.2018.31.16.
Muhammad Sani, Habiba, and Muhammad Mika'ilu Yabo. "A Database System Security Framework." International Journal of Computer Science and Information Technology 7, no. 6 (December 31, 2015): 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.
RM, Deepa. "Database Security with Fingerprint Masking." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.
Denning, D. E., S. G. Ak, M. Heckman, T. F. Lunt, M. Morgenstern, P. G. Neumann, and R. R. Schell. "Views for Multilevel Database Security." IEEE Transactions on Software Engineering SE-13, no. 2 (February 1987): 129–40. http://dx.doi.org/10.1109/tse.1987.232889.
Kang, Yue. "Legal Protection of Database Security." International Journal of Engineering Practical Research 4, no. 1 (2015): 38–41. http://dx.doi.org/10.12783/ijepr.2015.0401.08.
Yang, Li. "Teaching database security and auditing." ACM SIGCSE Bulletin 41, no. 1 (March 4, 2009): 241–45. http://dx.doi.org/10.1145/1539024.1508954.
Sarmah, Simanta Shekhar. "Database Security –Threats & Prevention." International Journal of Computer Trends and Technology 67, no. 5 (May 25, 2019): 46–53. http://dx.doi.org/10.14445/22312803/ijctt-v67i5p108.
Maheshwari, Anil. "Database Security for the Web." Information Systems Management 16, no. 2 (March 1999): 85–88. http://dx.doi.org/10.1201/1078/43188.16.2.19990301/31181.13.
Jajodia, Sushil, and Duminda Wijesekera. "Security in Federated Database Systems." Information Security Technical Report 6, no. 2 (June 2001): 69–79. http://dx.doi.org/10.1016/s1363-4127(01)00208-4.
Highland, Esther H. "An introduction to database security." Computers & Security 7, no. 3 (June 1988): 329. http://dx.doi.org/10.1016/0167-4048(88)90104-6.
Avant, Deborah, and Kara Kingma Neu. "The Private Security Events Database." Journal of Conflict Resolution 63, no. 8 (January 30, 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.
Ma, Cai Xia, Wei Zhang, Zhi Gang Zhang, and Yan Min Wang. "Oracle Database Security and Protection." Applied Mechanics and Materials 571-572 (June 2014): 586–90. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.586.
Bertino, Elisa, Sushil Jajodia, and Pierangela Samarati. "Database security: Research and practice." Information Systems 20, no. 7 (November 1995): 537–56. http://dx.doi.org/10.1016/0306-4379(95)00029-4.
Stenin, Dmitriy, Natalya Stenina, Arman Akanov, and Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes." E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.
Hashim, Hassan Bediar. "Challenges and Security Vulnerabilities to Impact on Database Systems." Al-Mustansiriyah Journal of Science 29, no. 2 (November 17, 2018): 117. http://dx.doi.org/10.23851/mjs.v29i2.332.
Maulana, Dimas Krisna, Sunilfa Maharani Tanjung, Reni Septiani Ritonga, and Ali Ikhwan. "Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi." Jurnal Sains dan Teknologi (JSIT) 3, no. 1 (January 15, 2023): 47–52. http://dx.doi.org/10.47233/jsit.v3i1.483.
KEKÜL, Hakan, Burhan ERGEN, and Halil ARSLAN. "Estimating Missing Security Vectors in NVD Database Security Reports." International Journal of Engineering and Manufacturing 12, no. 3 (June 8, 2022): 1–13. http://dx.doi.org/10.5815/ijem.2022.03.01.
Yesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, and Stanislaw A. Rajba. "Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model." Applied Sciences 11, no. 23 (November 25, 2021): 11175. http://dx.doi.org/10.3390/app112311175.
Neto, Afonso Araújo, and Marco Vieira. "Security Gaps in Databases." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 42–62. http://dx.doi.org/10.4018/jsse.2011070103.
Pancholi, Rahul, Indr jeet Rajput, and Vinit Kumar Vinit Kumar. "Security of Database Query Processing by Blocking SQL Injection Attacks." International Journal of Scientific Research 2, no. 6 (June 1, 2012): 212–14. http://dx.doi.org/10.15373/22778179/june2013/67.
M, Natarajan, and Manimegalai R. "Key agreement based secure Kerberos authentication protocol (KASKAP) for distributed database access in secured manner." International Journal of Engineering & Technology 7, no. 2.9 (April 26, 2018): 24. http://dx.doi.org/10.14419/ijet.v7i2.9.9364.
Rajguru, Shagufta, and Deepak Sharma. "Countermeasures to Database Security: A Survey." International Journal of Computer Applications 87, no. 7 (February 14, 2014): 1–5. http://dx.doi.org/10.5120/15217-3722.
Khamis, Allajabu Dafalla. "Security Framework for Distributed Database System." Journal of Data Analysis and Information Processing 07, no. 01 (2019): 1–13. http://dx.doi.org/10.4236/jdaip.2019.71001.