Works matching Database security


Results: 982
    1
    2
    3
    4

    A new comparative study of database security.

    Published in:
    Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2023, v. 33, n. 3, p. 17, doi. 10.33436/v33i3y202302
    By:
    • BĂRBULESCU, Daniel;
    • ENACHE-DUCOFFE, Adriana-Cristina;
    • TOGAN, Mihai
    Publication type:
    Article
    5
    6
    7
    8
    9
    10

    ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY.

    Published in:
    International Journal of Pattern Recognition & Artificial Intelligence, 2004, v. 18, n. 1, p. 3, doi. 10.1142/S0218001404003022
    By:
    • Yun Bai;
    • Yan Zhang
    Publication type:
    Article
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23

    DATABASE SECURITY IN RDF TERMS.

    Published in:
    Buletin Stiintific, 2023, v. 28, n. 1, p. 55, doi. 10.2478/bsaft-2023-0006
    By:
    • MOCEAN, Loredana;
    • VLAD, Miranda-Petronella
    Publication type:
    Article
    24
    25
    26
    27
    28
    29

    DATABASE SECURITY.

    Published in:
    Strategic Finance, 2002, v. 84, n. 6, p. 48
    By:
    • Fulkerson, Cheryl L.;
    • Gonsoulin, Mark A.;
    • Walz, Diane B.
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36

    Database Security for the Web.

    Published in:
    Information Systems Management, 1999, v. 16, n. 2, p. 85, doi. 10.1201/1078/43188.16.2.19990301/31181.13
    By:
    • Maheshwari, Anil
    Publication type:
    Article
    37
    38
    39
    40
    41
    42
    43
    44
    45

    Sensors data encryption using TSFS Algorithm.

    Published in:
    Journal of Madenat Al-Elem University College / Magallaẗ Kulliyyaẗ Madīnaẗ Al-ʿAlam Al-Ğāmi'aẗ, 2018, v. 10, n. 1, p. 32
    By:
    • Habeeb, Shatha;
    • Hassan, Rehab F.
    Publication type:
    Article
    46
    47
    48

    End-to-End Database Software Security.

    Published in:
    Software (2674-113X), 2023, v. 2, n. 2, p. 163, doi. 10.3390/software2020007
    By:
    • Ulybyshev, Denis;
    • Rogers, Michael;
    • Kholodilo, Vadim;
    • Northern, Bradley
    Publication type:
    Article
    49

    INTEGRATED ASSOCIATION RULES COMPLETE HIDING ALGORITHMS.

    Published in:
    Advances in Electrical & Electronic Engineering, 2017, v. 15, n. 2, p. 192, doi. 10.15598/aeee.v15i2.2164
    By:
    • ABDELLAH, Mohamed Refaat;
    • MOHAMED, Hesham Aboelsoud;
    • BADRAN, Khaled Shafee;
    • SENOUSY, Mohamed Badr
    Publication type:
    Article
    50