Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Database security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Database security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Database security"
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Der volle Inhalt der QuelleSharma, Shivani. "A Comparative Study on Database Breach and Security in Contemporary Perspective." International Journal for Research in Applied Science and Engineering Technology 12, no. 8 (August 31, 2024): 11–16. http://dx.doi.org/10.22214/ijraset.2024.63853.
Der volle Inhalt der QuelleProf., Reshma Totare, Swamy Vishakha, Singh Anjali, and TejaswiniYadav. "MARKOV DECISION POLICY BASED DATABASE SECURITY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 22–24. https://doi.org/10.5281/zenodo.1411153.
Der volle Inhalt der QuelleDenning, D. E. "Database Security." Annual Review of Computer Science 3, no. 1 (June 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Der volle Inhalt der QuelleLunt, Teresa F., and Eduardo B. Fernandez. "Database security." ACM SIGMOD Record 19, no. 4 (December 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Der volle Inhalt der QuelleMorrison, Paul. "Database Security." Network Security 2003, no. 6 (June 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Der volle Inhalt der QuelleParisi, Cameron, and Samantha Renicker. "Database security." Advances in Engineering Innovation 2, no. 1 (October 7, 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Der volle Inhalt der QuelleJ C, Ogbonna, Nwokoma F O, and Ejem A. "Database Security Issues: A Review." International Journal of Science and Research (IJSR) 6, no. 8 (August 5, 2017): 1812–16. http://dx.doi.org/10.21275/art20176415.
Der volle Inhalt der QuelleMubina, Malik, and Patel Trisha. "DATABASE SECURITY - ATTACKS AND CONTROL METHODS." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (March 27, 2016): 175–83. https://doi.org/10.5281/zenodo.7714485.
Der volle Inhalt der QuelleSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Der volle Inhalt der QuelleDissertationen zum Thema "Database security"
Sakhi, Imal. "Database security in the cloud." Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Der volle Inhalt der QuelleChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Der volle Inhalt der QuelleWong, Wai-kit, and 王偉傑. "Security and computability in database applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Der volle Inhalt der QuelleKong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Der volle Inhalt der QuelleHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Der volle Inhalt der QuelleChen, Yu. "Protection of database security via collaborative inference detection." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Der volle Inhalt der QuelleBernagozzi, Stefano. "Range Queries on an encrypted outsourced database." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Der volle Inhalt der QuellePokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Der volle Inhalt der QuelleHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Der volle Inhalt der QuelleZhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Der volle Inhalt der QuelleBücher zum Thema "Database security"
Samarati, Pierangela, and Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Der volle Inhalt der QuelleMelissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Den vollen Inhalt der Quelle findenSilvana, Castano, ed. Database security. New York, N.Y: ACM Press, 1995.
Den vollen Inhalt der Quelle findenSpooner, David L., Steven A. Demurjian, and John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Der volle Inhalt der QuelleLin, T. Y., and Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Der volle Inhalt der QuelleJajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Der volle Inhalt der QuelleMustafa, Osama, and Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Der volle Inhalt der QuelleGertz, Michael, and Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Der volle Inhalt der QuelleF, Lunt Teresa, and Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.
Den vollen Inhalt der Quelle findenIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Database security"
Willis, Thearon. "Database Security." In Practical Database Design for the Web, 176–94. Berkeley, CA: Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5377-8_8.
Der volle Inhalt der QuelleMalcher, Michelle. "Database Security." In DBA Transformations, 69–82. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3243-9_6.
Der volle Inhalt der QuelleBertino, Elisa, Ji-Won Byun, and Ashish Kamra. "Database Security." In Security, Privacy, and Trust in Modern Data Management, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_7.
Der volle Inhalt der QuelleFerrari, Elena. "Database Security." In Encyclopedia of Database Systems, 728–32. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_111.
Der volle Inhalt der QuelleKaufmann, Michael, and Andreas Meier. "Database Security." In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.
Der volle Inhalt der QuelleFerrari, Elena. "Database Security." In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_111-2.
Der volle Inhalt der QuelleFerrari, Elena. "Database Security." In Encyclopedia of Database Systems, 974–79. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_111.
Der volle Inhalt der QuelleLunt, Teresa F. "Strategic Directions in Computer Security Research." In Database Security, 3–10. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Der volle Inhalt der QuelleSandhu, Ravi, and John Campbell. "Open Issues in Database Security." In Database Security, 169–73. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_10.
Der volle Inhalt der QuelleJajodia, Sushil, Luigi V. Mancini, and Indrajit Ray. "Secure Locking Protocols for Multilevel Database Management Systems." In Database Security, 177–94. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_11.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Database security"
Bennett, Kelly W., and James Robertson. "Database optimization: automation, security, and resiliency." In Disruptive Technologies in Information Sciences IX, edited by Bryant T. Wysocki and Misty Blowers, 28. SPIE, 2025. https://doi.org/10.1117/12.3057423.
Der volle Inhalt der QuelleSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562909.
Der volle Inhalt der QuelleBeaubouef, Theresa, and Frederick E. Petry. "Database security issues in rough relational databases." In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.
Der volle Inhalt der QuelleGuimaraes, Mario, Meg Murray, and Richard Austin. "Incorporating database security courseware into a database security class." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409914.
Der volle Inhalt der QuelleCinar, Onur, R. Haluk Guncer, and Adnan Yazici. "Database Security in Private Database Clouds." In 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016. http://dx.doi.org/10.1109/icissec.2016.7885847.
Der volle Inhalt der QuelleAwodiji, Temitope. "Database Security in a Dynamic IT world." In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.
Der volle Inhalt der QuelleBlake, Errol A. "Network and database security." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409937.
Der volle Inhalt der QuelleSingh, Prabhsimran, and Kuljit Kaur. "Database security using encryption." In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155019.
Der volle Inhalt der QuelleGuimaraes, Mario A. M., Richard Austin, and Huwida Said. "Database forensics." In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940958.
Der volle Inhalt der QuelleJoo, Hankyu. "Practical Database Encryption Scheme for Database-as-a-Service." In Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.93.08.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Database security"
Baer, M., R. Charlet, W. Hardaker, R. Story, and C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, March 2007. http://dx.doi.org/10.17487/rfc4807.
Der volle Inhalt der QuelleBurns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, July 1993. http://dx.doi.org/10.21236/ada268885.
Der volle Inhalt der QuelleLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, March 1991. http://dx.doi.org/10.21236/ada237573.
Der volle Inhalt der QuellePolk, W. Timothy, and Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.
Der volle Inhalt der QuelleKang, Myong H., Judith N. Froscher, John McDermott, Oliver Costich, and Rodney Peyton. Achieving Database Security Through Data Replication: The Sintra Prototype. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada464289.
Der volle Inhalt der QuelleŠulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, December 2024. https://doi.org/10.57005/ab.2024.3.4.
Der volle Inhalt der QuelleNotargiacomo, LouAnna, and Teresa Lunt. Research Directions in Database Security VI: Proceedings of the Rome Laboratory Multilevel Database Security Workshop (6th) Held at the Southwest Harbor, Maine on 22-24 June 1994. Fort Belvoir, VA: Defense Technical Information Center, September 1995. http://dx.doi.org/10.21236/ada300794.
Der volle Inhalt der QuelleDe Paula, Everton G., and Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada235448.
Der volle Inhalt der QuelleCarpenter, R., and D. Sweeney. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits. Office of Scientific and Technical Information (OSTI), March 1995. http://dx.doi.org/10.2172/86892.
Der volle Inhalt der QuellePerlo-Freeman, Sam, Elisabeth Sköns, Carina Solmirano, and Helen Wilandh. Trends in World Military Expenditure, 2012. Stockholm International Peace Research Institute, April 2013. http://dx.doi.org/10.55163/mqgg1283.
Der volle Inhalt der Quelle