Literatura académica sobre el tema "Database security"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Database security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Database security"

1

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Texto completo
Resumen
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privilege, regularly updating and patching DBMS, conducting regular security audits, providing user awareness training, implementing data encryption, monitoring and logging database activities, developing an incident response plan, staying updated with the latest research and best practices, and continuously improving security measures. By following this methodology, organizations can effectively enhance the security of their databases and safeguard critical data from potential attacks and breaches. Emphasis is placed on regular review and updates to security measures to proactively address evolving threats and ensure continuous protection of sensitive data.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Sharma, Shivani. "A Comparative Study on Database Breach and Security in Contemporary Perspective." International Journal for Research in Applied Science and Engineering Technology 12, no. 8 (August 31, 2024): 11–16. http://dx.doi.org/10.22214/ijraset.2024.63853.

Texto completo
Resumen
Abstract: In the modern technical landscape, database security has emerged as a critical concern. The primary goal of database security is to prevent unauthorized access and data modification while ensuring uninterrupted access to required services. Various security measures have been devised to safeguard databases, and numerous security models have been established, each focusing on different aspects of database security. The effectiveness of these security measures relies on the design and development of the database management system for protection. In the current environment where web applications with databases as a backend are proliferating, a secure database management system is vital, going beyond just securing the database itself. This paper focuses on database breaches, identifying the risks, security measures, and weaknesses in managing a Database Management System.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Prof., Reshma Totare, Swamy Vishakha, Singh Anjali, and TejaswiniYadav. "MARKOV DECISION POLICY BASED DATABASE SECURITY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 22–24. https://doi.org/10.5281/zenodo.1411153.

Texto completo
Resumen
An advanced database security system using Markov based policy is proposed. In large databases in this work, along with it’s a difficult task to keep the data up to date where huge data of dynamic nature occurs. In e-commerce sites, large data lands up and the database might not get updated. This causes staleness in data and also, if the database undergoes updation, it might not be available for access during that time. Sometimes, updation is not possible without human intervention, hence Markov based policy is used which would perform fixed interval updates effectively and lead to cost savings. In addition to updation, this policy can be used for the security of the system;the proposed system has a middleware that will restore the database using the Markov updation policy in case of attack. The middleware will process the changes in the data and display the details of the attacker and also the changes done by the attacker. Thus, this database system can also be secured using the Markov policy and this three layered security framework https://journalnx.com/journal-article/20150561
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Denning, D. E. "Database Security." Annual Review of Computer Science 3, no. 1 (June 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Lunt, Teresa F., and Eduardo B. Fernandez. "Database security." ACM SIGMOD Record 19, no. 4 (December 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Morrison, Paul. "Database Security." Network Security 2003, no. 6 (June 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Parisi, Cameron, and Samantha Renicker. "Database security." Advances in Engineering Innovation 2, no. 1 (October 7, 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.

Texto completo
Resumen
In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The introductory segment delineates essential fortification strategies and succinctly touches upon optimal practices for shaping a database environments network topography and error mitigation methodologies. Subsequent to this panoramic insight, the discourse pivots to spotlight a diverse array of methodologies to discern and neutralize SQL injection forays.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

J C, Ogbonna, Nwokoma F O, and Ejem A. "Database Security Issues: A Review." International Journal of Science and Research (IJSR) 6, no. 8 (August 5, 2017): 1812–16. http://dx.doi.org/10.21275/art20176415.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Mubina, Malik, and Patel Trisha. "DATABASE SECURITY - ATTACKS AND CONTROL METHODS." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (March 27, 2016): 175–83. https://doi.org/10.5281/zenodo.7714485.

Texto completo
Resumen
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. A secure database is the one which is reciprocated from different possible database attacks. Security models are required to develop for databases. These models are different in many aspects as they are dealing with different issues of the database security. They may different also because of they are taking different assumptions about what constitutes a secure database. So, it becomes very difficult for database security seekers to select appropriate model for securing their database. In this paper, we have discussed some of the attacks that can be possible with its counter measures and its control methods that can be possible. Securing database is important approach for the planning of explicit and directive based database security requirements. Ensuring security for database is very critical issues for the companies. As complexity of database increases, we may tend to have more complex security issues of database.  
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Tesis sobre el tema "Database security"

1

Sakhi, Imal. "Database security in the cloud." Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.

Texto completo
Resumen
The aim of the thesis is to get an overview of the database services available in cloud computing environment, investigate the security risks associated with it and propose the possible countermeasures to minimize the risks. The thesis also analyzes two cloud database service providers namely; Amazon RDS and Xeround. The reason behind choosing these two providers is because they are currently amongst the leading cloud database providers and both provide relational cloud databases which makes the comparison useful. The focus of the analysis has been to provide an overview of their database services as well as the available security measurements. A guide has been appended at the end of the report to help with technical configurations of database migration and connecting applications to the databases for the two mentioned cloud database providers. The thesis has been conducted on behalf of the Swedish Armed Forces and after reviewing the security risks associated with cloud databases, it is recommended that the Armed Forces should refrain from public cloud database services. Security deficiencies such as vague physical security and access control procedures, unavailability of preferred monitoring tools and most importantly the absence of proper encryption and key management schemes make the public database services useless for an authority such as the Armed Forces.  The recommended solutions are therefore to either use a jointly-owned community cloud database solution for less confidential data only or to use on-premise private cloud database solution for all but the TOP SECRET classified data.     Keywords: Cloud computing, cloud database services, Swedish Armed Forces, security risks, Xeround, Amazon RDS
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Chung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Wong, Wai-kit, and 王偉傑. "Security and computability in database applications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Hoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms." UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.

Texto completo
Resumen
The cloud database is a relatively new type of distributed database that allows companies and individuals to purchase computing time and memory from a vendor. This allows a user to only pay for the resources they use, which saves them both time and money. While the cloud in general can solve problems that have previously been too costly or time-intensive, it also opens the door to new security problems because of its distributed nature. Several approaches have been proposed to increase the security of cloud databases, though each seems to fall short in one area or another. This thesis presents the Hoeppner Security Algorithm (HSA) as a solution to these security problems. The HSA safeguards user’s data and metadata by adding fake records alongside the real records, breaking up the database by column or groups of columns, and by storing each group in a different cloud. The efficiency and security of this algorithm was compared to the Alzain algorithm (one of the proposed security solutions that inspired the HSA), and it was found that the HSA outperforms the Alzain algorithm in most every way.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Chen, Yu. "Protection of database security via collaborative inference detection." Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Bernagozzi, Stefano. "Range Queries on an encrypted outsourced database." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.

Texto completo
Resumen
This project is about retrieving data in range without allowing the server to read it, when the database is stored in the server. Basically, our goal is to build a database that allows the client to maintain the confidentiality of the data stored, despite all the data is stored in a different location from the client's hard disk. This means that all the information written on the hard disk can be easily read by another person who can do anything with it. Given that, we need to encrypt that data from eavesdroppers or other people. This is because they could sell it or log into accounts and use them for stealing money or identities. In order to achieve this, we need to encrypt the data stored in the hard drive, so that only the possessor of the key can easily read the information stored, while all the others are going to read only encrypted data. Obviously, according to that, all the data management must be done by the client, otherwise any malicious person can easily retrieve it and use it for any malicious intention. All the methods analysed here relies on encrypting data in transit. In the end of this project we analyse 2 theoretical and practical methods for the creation of the above databases and then we tests them with 3 datasets and with 10, 100 and 1000 queries. The scope of this work is to retrieve a trend that can be useful for future works based on this project.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Pokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.

Texto completo
Resumen
The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database systems - Oracle, IBM DB2, Microsoft SQL Server, and PostgreSQL. Comparative criteria are based upon the list of requirements on database security and reflect specific attributes of the specific type of the data model. The comparison aims at utilization possibilities of each database product as well as its limitations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ho, Sze-lok, and 何思樂. "Technical solutions for conducting investigations in digital age." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.

Texto completo
Resumen
Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution for this confidential data request and transfer problem cannot be found from related research, our goal is to offer a means that can help keeping the investigation secret and protecting irrelevant data at the same time. We present a technical solution for preserving two-way confidentiality between the investigator (legitimate data requester) and the database owner (legitimate data holder), which can accommodate the concerns of both sides during the specific information request and transfer. Two schemes, Sender-Based Scheme and Receiver-Based Scheme, have been proposed to solve the problem under different conditions, and illustration of executing our schemes is given through an example situation “Investigator and Private hospital” which is an ordinary scenario during investigation. Furthermore, a practical cost reduction methodology on the schemes and sensible proposals for extensions are suggested and discussed. The direction of future work is also considered.<br>published_or_final_version<br>Computer Science<br>Master<br>Master of Philosophy
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Zhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Libros sobre el tema "Database security"

1

Samarati, Pierangela, and Ravi S. Sandhu, eds. Database Security. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Melissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Silvana, Castano, ed. Database security. New York, N.Y: ACM Press, 1995.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Spooner, David L., Steven A. Demurjian, and John E. Dobson, eds. Database Security IX. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Lin, T. Y., and Shelly Qian, eds. Database Security XI. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Jajodia, Sushil, ed. Database Security XII. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35564-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Mustafa, Osama, and Robert P. Lockard. Oracle Database Application Security. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5367-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Gertz, Michael, and Sushil Jajodia, eds. Handbook of Database Security. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-48533-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

F, Lunt Teresa, and Rome Air Development Center, eds. Research directionsin database security. New York: Springer-Verlag, 1992.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

IFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Más fuentes

Capítulos de libros sobre el tema "Database security"

1

Willis, Thearon. "Database Security." In Practical Database Design for the Web, 176–94. Berkeley, CA: Apress, 2002. http://dx.doi.org/10.1007/978-1-4302-5377-8_8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Malcher, Michelle. "Database Security." In DBA Transformations, 69–82. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-3243-9_6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Bertino, Elisa, Ji-Won Byun, and Ashish Kamra. "Database Security." In Security, Privacy, and Trust in Modern Data Management, 87–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-69861-6_7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Ferrari, Elena. "Database Security." In Encyclopedia of Database Systems, 728–32. Boston, MA: Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-39940-9_111.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kaufmann, Michael, and Andreas Meier. "Database Security." In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Ferrari, Elena. "Database Security." In Encyclopedia of Database Systems, 1–6. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_111-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Ferrari, Elena. "Database Security." In Encyclopedia of Database Systems, 974–79. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_111.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Lunt, Teresa F. "Strategic Directions in Computer Security Research." In Database Security, 3–10. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Sandhu, Ravi, and John Campbell. "Open Issues in Database Security." In Database Security, 169–73. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_10.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Jajodia, Sushil, Luigi V. Mancini, and Indrajit Ray. "Secure Locking Protocols for Multilevel Database Management Systems." In Database Security, 177–94. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_11.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Database security"

1

Bennett, Kelly W., and James Robertson. "Database optimization: automation, security, and resiliency." In Disruptive Technologies in Information Sciences IX, edited by Bryant T. Wysocki and Misty Blowers, 28. SPIE, 2025. https://doi.org/10.1117/12.3057423.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1562909.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Beaubouef, Theresa, and Frederick E. Petry. "Database security issues in rough relational databases." In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Guimaraes, Mario, Meg Murray, and Richard Austin. "Incorporating database security courseware into a database security class." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409914.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Cinar, Onur, R. Haluk Guncer, and Adnan Yazici. "Database Security in Private Database Clouds." In 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016. http://dx.doi.org/10.1109/icissec.2016.7885847.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Awodiji, Temitope. "Database Security in a Dynamic IT world." In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.

Texto completo
Resumen
Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Blake, Errol A. "Network and database security." In the 4th annual conference. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1409908.1409937.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Singh, Prabhsimran, and Kuljit Kaur. "Database security using encryption." In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE). IEEE, 2015. http://dx.doi.org/10.1109/ablaze.2015.7155019.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Guimaraes, Mario A. M., Richard Austin, and Huwida Said. "Database forensics." In 2010 Information Security Curriculum Development Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1940941.1940958.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Joo, Hankyu. "Practical Database Encryption Scheme for Database-as-a-Service." In Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.93.08.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Database security"

1

Baer, M., R. Charlet, W. Hardaker, R. Story, and C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, March 2007. http://dx.doi.org/10.17487/rfc4807.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Burns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, July 1993. http://dx.doi.org/10.21236/ada268885.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Lung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, March 1991. http://dx.doi.org/10.21236/ada237573.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Polk, W. Timothy, and Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Kang, Myong H., Judith N. Froscher, John McDermott, Oliver Costich, and Rodney Peyton. Achieving Database Security Through Data Replication: The Sintra Prototype. Fort Belvoir, VA: Defense Technical Information Center, January 1994. http://dx.doi.org/10.21236/ada464289.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Šulus, Vytautas, and Pavel Voitkun. Prototype of the Electronic Voting System. Security Implementations Using Database Facilities. Vilnius Business College, December 2024. https://doi.org/10.57005/ab.2024.3.4.

Texto completo
Resumen
Electronic Voting Systems (EVS) has become more popular and has progressed despite many concerns about auditing and transparency. Authors present a technical solution for a prototype of a possible EVS. This prototype, with additional improvements, could be used as an EVS in Lithuania and other countries worldwide. This article is intended to show how EVS requirements relate to software solutions using open-source products.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Notargiacomo, LouAnna, and Teresa Lunt. Research Directions in Database Security VI: Proceedings of the Rome Laboratory Multilevel Database Security Workshop (6th) Held at the Southwest Harbor, Maine on 22-24 June 1994. Fort Belvoir, VA: Defense Technical Information Center, September 1995. http://dx.doi.org/10.21236/ada300794.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

De Paula, Everton G., and Michael L. Nelson. Clustering, Concurrency Control, Crash Recovery, Garbage Collection, and Security in Object-Oriented Database Management Systems. Fort Belvoir, VA: Defense Technical Information Center, February 1991. http://dx.doi.org/10.21236/ada235448.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Carpenter, R., and D. Sweeney. DISSS/PSDB - Personnel Security Database Modernization Project: Compilation of data gathered from DOE Operations Office`s site visits. Office of Scientific and Technical Information (OSTI), March 1995. http://dx.doi.org/10.2172/86892.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Perlo-Freeman, Sam, Elisabeth Sköns, Carina Solmirano, and Helen Wilandh. Trends in World Military Expenditure, 2012. Stockholm International Peace Research Institute, April 2013. http://dx.doi.org/10.55163/mqgg1283.

Texto completo
Resumen
From 15 April 2013 the SIPRI Military Expenditure Database includes newly released information on military expenditure in 2012. This Fact Sheet describes the global, regional and national trends in military expenditure that are revealed by the new data, with a special focus on security spending in Central America.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía