Výsledky vyhledávání - "ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security"
-
1
Autoři: a další
Přispěvatelé: a další
Zdroj: https://hal.science/hal-02946732 ; 2020.
Témata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2010.07542; ARXIV: 2010.07542
-
2
Autoři: a další
Přispěvatelé: a další
Zdroj: https://hal.science/hal-02946732 ; 2020.
Témata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2010.07542; ARXIV: 2010.07542
-
3
Autoři: a další
Přispěvatelé: a další
Zdroj: https://hal.archives-ouvertes.fr/hal-02946732 ; 2020.
Témata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2010.07542; hal-02946732; https://hal.archives-ouvertes.fr/hal-02946732; https://hal.archives-ouvertes.fr/hal-02946732/document; https://hal.archives-ouvertes.fr/hal-02946732/file/paper.pdf; ARXIV: 2010.07542
-
4
Autoři: a další
Přispěvatelé: a další
Zdroj: https://hal.science/hal-02946732 ; 2020.
Témata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2010.07542; ARXIV: 2010.07542
-
5
Autoři: a další
Přispěvatelé: a další
Zdroj: The International Journal on Very Large Databases ; https://hal.science/hal-01529610 ; The International Journal on Very Large Databases, 2017, 26 (5), pp.657-681 ; https://link.springer.com/article/10.1007/s00778-017-0470-9
Témata: Data access, Data integrity, Cloud computing, Secret sharing, Data privacy, Data availability, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1712.10155; ARXIV: 1712.10155
-
6
Autoři: a další
Přispěvatelé: a další
Zdroj: The International Journal on Very Large Databases ; https://hal.science/hal-01529610 ; The International Journal on Very Large Databases, 2017, 26 (5), pp.657-681 ; https://link.springer.com/article/10.1007/s00778-017-0470-9
Témata: Data access, Data integrity, Cloud computing, Secret sharing, Data privacy, Data availability, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1712.10155; ARXIV: 1712.10155
-
7
Autoři: a další
Přispěvatelé: a další
Zdroj: The International Journal on Very Large Databases ; https://hal.science/hal-01529610 ; The International Journal on Very Large Databases, 2017, 26 (5), pp.657-681 ; https://link.springer.com/article/10.1007/s00778-017-0470-9
Témata: Data access, Data integrity, Cloud computing, Secret sharing, Data privacy, Data availability, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1712.10155; ARXIV: 1712.10155
-
8
Autoři: a další
Přispěvatelé: a další
Zdroj: The International Journal on Very Large Databases ; https://hal.archives-ouvertes.fr/hal-01529610 ; The International Journal on Very Large Databases, Springer-Verlag, 2017, 26 (5), pp.657-681 ; https://link.springer.com/article/10.1007/s00778-017-0470-9
Témata: Data access, Data integrity, Cloud computing, Secret sharing, Data privacy, Data availability, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1712.10155; hal-01529610; https://hal.archives-ouvertes.fr/hal-01529610; https://hal.archives-ouvertes.fr/hal-01529610/document; https://hal.archives-ouvertes.fr/hal-01529610/file/secret-sharing-cloud-survey.pdf; ARXIV: 1712.10155
-
9
Autoři: a další
Přispěvatelé: a další
Zdroj: 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
https://inria.hal.science/inria-00137171
26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2007, Pekin, ChinaTémata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
-
10
Autoři: a další
Přispěvatelé: a další
Zdroj: 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
https://inria.hal.science/inria-00137171
26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2007, Pekin, ChinaTémata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
-
11
Autoři: a další
Přispěvatelé: a další
Zdroj: 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
https://inria.hal.science/inria-00137171
26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2007, Pekin, ChinaTémata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
-
12
Autoři: a další
Přispěvatelé: a další
Zdroj: 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
https://hal.inria.fr/inria-00137171
26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2007, Pekin, ChinaTémata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
Relation: inria-00137171; https://hal.inria.fr/inria-00137171; https://hal.inria.fr/inria-00137171/document; https://hal.inria.fr/inria-00137171/file/pods071-cautis.pdf
-
13
Autoři: a další
Přispěvatelé: a další
Zdroj: Sixth International IFIP WG 1.7 Workshop on Issues in the Theory of Security ; https://inria.hal.science/inria-00001262 ; Sixth International IFIP WG 1.7 Workshop on Issues in the Theory of Security, Mar 2006, Vienna/Austria, pp.40-54
Témata: access control, formal specification, verification, refinement, OrBAC, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.1: Specifying and Verifying and Reasoning about Programs/F.3.1.5: Specification techniques, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/cs.LO/0604081; ARXIV: cs.LO/0604081
-
14
Autoři: a další
Přispěvatelé: a další
Zdroj: Sixth International IFIP WG 1.7 Workshop on Issues in the Theory of Security ; https://hal.inria.fr/inria-00001262 ; Sixth International IFIP WG 1.7 Workshop on Issues in the Theory of Security, Mar 2006, Vienna/Austria, pp.40-54
Témata: access control, formal specification, verification, refinement, OrBAC, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: F.: Theory of Computation/F.3: LOGICS AND MEANINGS OF PROGRAMS/F.3.1: Specifying and Verifying and Reasoning about Programs/F.3.1.5: Specification techniques, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/cs.LO/0604081; inria-00001262; https://hal.inria.fr/inria-00001262; https://hal.inria.fr/inria-00001262/document; https://hal.inria.fr/inria-00001262/file/final.pdf; ARXIV: cs.LO/0604081
-
15
Autoři: a další
Přispěvatelé: a další
Témata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], edu, info
Relation: https://hal.archives-ouvertes.fr/hal-02946732/file/paper.pdf; https://hal.archives-ouvertes.fr/hal-02946732
-
16
Autoři: a další
Přispěvatelé: a další
Zdroj: The International Journal on Very Large Databases ; https://hal.archives-ouvertes.fr/hal-01529610 ; The International Journal on Very Large Databases, Springer-Verlag, 2017, 26 (5), pp.657-681 ; https://link.springer.com/article/10.1007/s00778-017-0470-9
Témata: Data access, Data integrity, Cloud computing, Secret sharing, Data privacy, Data availability, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security, integrity, and protection, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], info, geo
Relation: https://hal.archives-ouvertes.fr/hal-01529610/file/secret-sharing-cloud-survey.pdf; https://hal.archives-ouvertes.fr/hal-01529610
Nájsť tento článok vo Web of Science