Artículos de revistas sobre el tema "Database security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Database security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.
Texto completoSharma, Shivani. "A Comparative Study on Database Breach and Security in Contemporary Perspective." International Journal for Research in Applied Science and Engineering Technology 12, no. 8 (2024): 11–16. http://dx.doi.org/10.22214/ijraset.2024.63853.
Texto completoProf., Reshma Totare, Swamy Vishakha, Singh Anjali, and TejaswiniYadav. "MARKOV DECISION POLICY BASED DATABASE SECURITY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 22–24. https://doi.org/10.5281/zenodo.1411153.
Texto completoDenning, D. E. "Database Security." Annual Review of Computer Science 3, no. 1 (1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.
Texto completoLunt, Teresa F., and Eduardo B. Fernandez. "Database security." ACM SIGMOD Record 19, no. 4 (1990): 90–97. http://dx.doi.org/10.1145/122058.122069.
Texto completoMorrison, Paul. "Database Security." Network Security 2003, no. 6 (2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.
Texto completoParisi, Cameron, and Samantha Renicker. "Database security." Advances in Engineering Innovation 2, no. 1 (2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.
Texto completoJ C, Ogbonna, Nwokoma F O, and Ejem A. "Database Security Issues: A Review." International Journal of Science and Research (IJSR) 6, no. 8 (2017): 1812–16. http://dx.doi.org/10.21275/art20176415.
Texto completoMubina, Malik, and Patel Trisha. "DATABASE SECURITY - ATTACKS AND CONTROL METHODS." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (2016): 175–83. https://doi.org/10.5281/zenodo.7714485.
Texto completoSaid, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.
Texto completoITAI, YAYA, AWODELE OLUDELE PhD, and NICOLAE GOGA PhD. "Trigger and Database Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.
Texto completoMehta, Raju. "Oracle Database Security." Information Systems Security 13, no. 5 (2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.
Texto completoHarris, Duncan, and David Sidwell. "Distributed database security." Computers & Security 13, no. 7 (1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.
Texto completoMamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.
Texto completoVineet, Patel, and Kulkarni Akanksha. "Brief Study on Database Security." Journal of Network Security and Data Mining 6, no. 2 (2023): 16–22. https://doi.org/10.5281/zenodo.7906959.
Texto completoVishwakarma, Jaychand, and Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.
Texto completoMammadova, Tamilla Abuseid k., Rana Faramaz k. Hajieva, and Zumrud Abuseid k. Murtuzalieva. "ORACLE MAXIMUM SECURITY ARCHITECTURE." Deutsche internationale Zeitschrift für zeitgenössische Wissenschaft 66 (October 19, 2023): 106–10. https://doi.org/10.5281/zenodo.10021896.
Texto completoAhmad, Khaleel, Mohammad Shoaib Alam, and Nur Izura Udzir. "Security of NoSQL Database Against Intruders." Recent Patents on Engineering 13, no. 1 (2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.
Texto completoPramod, Singh. "Three Layer Security Model for Distributed Relational Database." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3625–28. https://doi.org/10.35940/ijeat.B3183.029320.
Texto completoDokka, Bharat Kumar, and Akshun Chhapola. "Database Security and Hardening." International Journal of Research in Modern Engineering & Emerging Technology 13, no. 4 (2025): 79–97. https://doi.org/10.63345/ijrmeet.org.v13.i4.5.
Texto completoMatey, Preeti. "Strengthening Database Security: RBAC, Encryption, Backup, and 2FA Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–8. https://doi.org/10.55041/ijsrem39950.
Texto completoMocean, Loredana, and Miranda-Petronella Vlad. "Database Security in RDF Terms." Scientific Bulletin 28, no. 1 (2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.
Texto completoAlshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.
Texto completoPangalos, G. J. "Medical database security evaluation." Medical Informatics 18, no. 4 (1993): 283–92. http://dx.doi.org/10.3109/14639239309025317.
Texto completoSinghal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.
Texto completoPernul, G., and G. Luef. "Bibliography on database security." ACM SIGMOD Record 21, no. 1 (1992): 105–22. http://dx.doi.org/10.1145/130868.130884.
Texto completoPangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.
Texto completoJajodia, Sushil. "Database security and privacy." ACM Computing Surveys 28, no. 1 (1996): 129–31. http://dx.doi.org/10.1145/234313.234370.
Texto completoMunro, Ken. "Database security — an oxymoron?" Infosecurity Today 3, no. 6 (2006): 42. http://dx.doi.org/10.1016/s1742-6847(06)70485-2.
Texto completoPangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (1994): 159–71. http://dx.doi.org/10.1007/bf00996700.
Texto completoPan, Xueying, Anthony Obahiaghon, Brendan Makar, Samuel Wilson, and Christian Beard. "Analysis of Database Security." OALib 11, no. 04 (2024): 1–19. http://dx.doi.org/10.4236/oalib.1111366.
Texto completoJasim, Khalid F., and Akram M. Zeki. "Design of Protection Software Using Some Cryptosystems for Cloud Database Files." Cihan University-Erbil Scientific Journal 8, no. 1 (2024): 70–79. http://dx.doi.org/10.24086/cuesj.v8n1y2024.pp70-79.
Texto completoTeimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems." UHD Journal of Science and Technology 5, no. 2 (2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.
Texto completoAlshammari, Ahmad. "Structuring and organizing database security domain from big data perspective using meta-modeling approach." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 2 (2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.
Texto completoP.J, Sankaranarayanan, and Geogen George. "Blockchain Based Aadhaar Security." International Journal of Engineering & Technology 7, no. 4.6 (2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.
Texto completoArputharaj J, Vijay, and Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 1 (2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.
Texto completoAdelia Marwah Ujung and Muhammad Irwan Padli Nasution. "Sistem Keamanan Database." Jurnal Penelitian Teknologi Informasi dan Sains 1, no. 2 (2023): 50–57. http://dx.doi.org/10.54066/jptis.v1i2.480.
Texto completoBAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.
Texto completoHaikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, and Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.
Texto completoLi, Dan Ning, Qi Li, and Xin Qiang Ma. "Research of Security Mechanisms Based on LogicSQL Database." Applied Mechanics and Materials 155-156 (February 2012): 352–56. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.352.
Texto completoAnsari, Sakil Ahmad, and Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.
Texto completoQUASIM, MD.TABREZ. "Security Issues in Distributed Database System Model." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 12 (2013): 396–99. https://doi.org/10.5281/zenodo.14613546.
Texto completoStenin, Dmitriy, Natalya Stenina, Arman Akanov, and Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes." E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.
Texto completoMargaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.
Texto completoSalman Rasheed Owaid. "Security of encrypted cloud database." Наука і техніка Повітряних Сил Збройних Сил України, no. 2(31) (April 27, 2018): 122–30. http://dx.doi.org/10.30748/nitps.2018.31.16.
Texto completoMuhammad Sani, Habiba, and Muhammad Mika'ilu Yabo. "A Database System Security Framework." International Journal of Computer Science and Information Technology 7, no. 6 (2015): 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.
Texto completoRM, Deepa. "Database Security with Fingerprint Masking." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.
Texto completoDenning, D. E., S. G. Ak, M. Heckman, et al. "Views for Multilevel Database Security." IEEE Transactions on Software Engineering SE-13, no. 2 (1987): 129–40. http://dx.doi.org/10.1109/tse.1987.232889.
Texto completoKang, Yue. "Legal Protection of Database Security." International Journal of Engineering Practical Research 4, no. 1 (2015): 38–41. http://dx.doi.org/10.12783/ijepr.2015.0401.08.
Texto completoYang, Li. "Teaching database security and auditing." ACM SIGCSE Bulletin 41, no. 1 (2009): 241–45. http://dx.doi.org/10.1145/1539024.1508954.
Texto completo