Academic literature on the topic 'Database security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Database security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Database security"
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Full textSharma, Shivani. "A Comparative Study on Database Breach and Security in Contemporary Perspective." International Journal for Research in Applied Science and Engineering Technology 12, no. 8 (August 31, 2024): 11–16. http://dx.doi.org/10.22214/ijraset.2024.63853.
Full textProf., Reshma Totare, Swamy Vishakha, Singh Anjali, and TejaswiniYadav. "MARKOV DECISION POLICY BASED DATABASE SECURITY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 22–24. https://doi.org/10.5281/zenodo.1411153.
Full textDenning, D. E. "Database Security." Annual Review of Computer Science 3, no. 1 (June 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Full textLunt, Teresa F., and Eduardo B. Fernandez. "Database security." ACM SIGMOD Record 19, no. 4 (December 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Full textMorrison, Paul. "Database Security." Network Security 2003, no. 6 (June 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Full textParisi, Cameron, and Samantha Renicker. "Database security." Advances in Engineering Innovation 2, no. 1 (October 7, 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Full textJ C, Ogbonna, Nwokoma F O, and Ejem A. "Database Security Issues: A Review." International Journal of Science and Research (IJSR) 6, no. 8 (August 5, 2017): 1812–16. http://dx.doi.org/10.21275/art20176415.
Full textMubina, Malik, and Patel Trisha. "DATABASE SECURITY - ATTACKS AND CONTROL METHODS." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (March 27, 2016): 175–83. https://doi.org/10.5281/zenodo.7714485.
Full textSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Full textDissertations / Theses on the topic "Database security"
Sakhi, Imal. "Database security in the cloud." Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Full textChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Full textWong, Wai-kit, and 王偉傑. "Security and computability in database applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Full textKong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Full textHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Full textChen, Yu. "Protection of database security via collaborative inference detection." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Full textBernagozzi, Stefano. "Range Queries on an encrypted outsourced database." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Full textPokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Full textHo, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Full textZhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Full textBooks on the topic "Database security"
Samarati, Pierangela, and Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.
Full textMelissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.
Find full textSpooner, David L., Steven A. Demurjian, and John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.
Full textLin, T. Y., and Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.
Full textJajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.
Full textMustafa, Osama, and Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.
Full textGertz, Michael, and Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.
Full textF, Lunt Teresa, and Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.
Find full textIFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.
Find full textBook chapters on the topic "Database security"
Willis, Thearon. "Database Security." In Practical Database Design for the Web, 176–94. Berkeley, CA: Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5377-8_8.
Full textMalcher, Michelle. "Database Security." In DBA Transformations, 69–82. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3243-9_6.
Full textBertino, Elisa, Ji-Won Byun, and Ashish Kamra. "Database Security." In Security, Privacy, and Trust in Modern Data Management, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_7.
Full textFerrari, Elena. "Database Security." In Encyclopedia of Database Systems, 728–32. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_111.
Full textKaufmann, Michael, and Andreas Meier. "Database Security." In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.
Full textFerrari, Elena. "Database Security." In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_111-2.
Full textFerrari, Elena. "Database Security." In Encyclopedia of Database Systems, 974–79. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_111.
Full textLunt, Teresa F. "Strategic Directions in Computer Security Research." In Database Security, 3–10. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.
Full textSandhu, Ravi, and John Campbell. "Open Issues in Database Security." In Database Security, 169–73. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_10.
Full textJajodia, Sushil, Luigi V. Mancini, and Indrajit Ray. "Secure Locking Protocols for Multilevel Database Management Systems." In Database Security, 177–94. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_11.
Full textConference papers on the topic "Database security"
Bennett, Kelly W., and James Robertson. "Database optimization: automation, security, and resiliency." In Disruptive Technologies in Information Sciences IX, edited by Bryant T. Wysocki and Misty Blowers, 28. SPIE, 2025. https://doi.org/10.1117/12.3057423.
Full textSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562909.
Full textBeaubouef, Theresa, and Frederick E. Petry. "Database security issues in rough relational databases." In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.
Full textGuimaraes, Mario, Meg Murray, and Richard Austin. "Incorporating database security courseware into a database security class." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409914.
Full textCinar, Onur, R. Haluk Guncer, and Adnan Yazici. "Database Security in Private Database Clouds." In 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016. http://dx.doi.org/10.1109/icissec.2016.7885847.
Full textAwodiji, Temitope. "Database Security in a Dynamic IT world." In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.
Full textBlake, Errol A. "Network and database security." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409937.
Full textSingh, Prabhsimran, and Kuljit Kaur. "Database security using encryption." In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155019.
Full textGuimaraes, Mario A. M., Richard Austin, and Huwida Said. "Database forensics." In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940958.
Full textJoo, Hankyu. "Practical Database Encryption Scheme for Database-as-a-Service." In Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.93.08.
Full textReports on the topic "Database security"
Baer, M., R. Charlet, W. Hardaker, R. Story, and C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, March 2007. http://dx.doi.org/10.17487/rfc4807.
Full textBurns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, July 1993. http://dx.doi.org/10.21236/ada268885.
Full textLung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, March 1991. http://dx.doi.org/10.21236/ada237573.
Full textPolk, W. Timothy, and Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.
Full textKang, Myong H., Judith N. Froscher, John McDermott, Oliver Costich, and Rodney Peyton. Achieving Database Security Through Data Replication: The Sintra Prototype. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada464289.
Full textŠulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, December 2024. https://doi.org/10.57005/ab.2024.3.4.
Full textNotargiacomo, LouAnna, and Teresa Lunt. Research Directions in Database Security VI: Proceedings of the Rome Laboratory Multilevel Database Security Workshop (6th) Held at the Southwest Harbor, Maine on 22-24 June 1994. Fort Belvoir, VA: Defense Technical Information Center, September 1995. http://dx.doi.org/10.21236/ada300794.
Full textDe Paula, Everton G., and Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada235448.
Full textCarpenter, R., and D. Sweeney. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits. Office of Scientific and Technical Information (OSTI), March 1995. http://dx.doi.org/10.2172/86892.
Full textPerlo-Freeman, Sam, Elisabeth Sköns, Carina Solmirano, and Helen Wilandh. Trends in World Military Expenditure, 2012. Stockholm International Peace Research Institute, April 2013. http://dx.doi.org/10.55163/mqgg1283.
Full text