Výsledky vyhledávání - ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security
-
1
Autoři: a další
Přispěvatelé: a další
Zdroj: ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011) ; https://hal.science/hal-01125862 ; ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011), May 2011, Waikiki, Honolulu, Hawaii, United States. pp.22-28, ⟨10.1145/1988630.1988635⟩
Témata: Model Driven Approach, Information System, Security, Sécurité, Système d'information, Approche Model Driven, ACM: H.: Information Systems/H.1: MODELS AND PRINCIPLES, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO]Computer Science [cs], [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
Geografické téma: Waikiki, Honolulu, Hawaii, United States
-
2
Autoři: Hawley, Douglas
Zdroj: Proceedings of the International Conference on Cyber Warfare & Security; 2019, p116-122, 7p
-
3
Autoři:
Zdroj: Communications of the ACM; Apr2008, Vol. 51 Issue 4, p64-68, 5p, 4 Charts
-
4
Autoři:
Zdroj: ACM Transactions on Database Systems; Dec99, Vol. 24 Issue 4, p487-493, 7p
-
5
Autoři: Okunola, Abiodun
-
6
Autoři:
Zdroj: Communications of the ACM; Mar1976, Vol. 19 Issue 3, p148-159, 12p, 6 Diagrams
-
7
Autoři: a další
Přispěvatelé: a další
Témata: Personal cloud, ACM: B.: Hardware, access control, embedded database, [INFO.INFO-ES] Computer Science [cs]/Embedded Systems, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY], [INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY], [INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET], [INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET], [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, secure hardware, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Popis souboru: application/pdf
Přístupová URL adresa: https://hal.science/hal-01427725v1
-
8
Differential privacy for relational algebra: improving the sensitivity bounds via constraint systems
Autoři: a další
Přispěvatelé: a další
Zdroj: QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages ; https://inria.hal.science/hal-00760688 ; QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages, Apr 2012, Tallin, Estonia. pp.92-105, ⟨10.4204/EPTCS.85.7⟩
Témata: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages/H.2.3.3: Query languages, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]
Time: Tallin, Estonia
-
9
Autoři: a další
Přispěvatelé: a další
Zdroj: ISSN: 1865-0929 ; Communications in Computer and Information Science ; https://hal.science/hal-01865880 ; Communications in Computer and Information Science, 909, pp.91-102, 2018, New Trends in Databases and Information Systems - ADBIS 2018 Short Papers and Workshops, ⟨10.1007/978-3-030-00063-9⟩ ; https://link.springer.com/book/10.1007/978-3-030-00063-9.
Témata: Big Data, Management, Analytics, Data Privacy, Security, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.3: INFORMATION STORAGE AND RETRIEVAL, ACM: I.: Computing Methodologies/I.2: ARTIFICIAL INTELLIGENCE, ACM: K.: Computing Milieux/K.5: LEGAL ASPECTS OF COMPUTING, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
10
Zdroj: Communications of the ACM; Sep76, Vol. 19 Issue 9, p531-537, 3p
-
11
Autoři:
Zdroj: ACM Transactions on Multimedia Computing, Communications & Applications; 2021Supplement, Vol. 17 Issue 2s, p1-17, 17p
-
12
Zdroj: Multimedia Tools & Applications; Apr2007, Vol. 33 Issue 1, p13-29, 17p
-
13
Autoři:
Zdroj: Journal of Intelligent Information Systems; Feb2012, Vol. 38 Issue 1, p131-159, 29p
-
14
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors, H.2.7 [Database Management, Database Administration—Security, integrity, and protection, K.6.5 [Management of Computing and Information Systems, Security and Protection General Terms, Security, Design Additional Key Words and Phrases, Applied cryptography, digital signature, secure audit logging, forward security, signature aggregation ACM Reference Format
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.3671; http://www4.ncsu.edu/~aayavuz/TISSEC2012.pdf
-
15
Autoři:
Zdroj: ACM Transactions on Database Systems; Jul2010, Vol. 35 Issue 3, p21-21:41, 41p, 5 Diagrams, 1 Chart
-
16
Autoři:
Zdroj: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 13 Issue 1, p5-5.27, 27p, 2 Charts
-
17
Autoři:
Zdroj: EPJ Web of Conferences; 11/20/2025, Vol. 341, p1-13, 13p
-
18
Autoři:
Zdroj: Journal of Intelligent Manufacturing; Aug2012, Vol. 23 Issue 4, p941-953, 13p
-
19
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, H.2.0 [Database Management, General—Security, integrity, and protection, K.6.5 [Management of Computing and Information Systems, Security and Protection—Authentication General Terms, Experimentation, Human Factors, Security Additional Key Words and Phrases, Access control, policy inference, machine learning ACM Reference Format
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.491; http://www.cs.unc.edu/~reiter/papers/2011/TISSEC1.pdf
-
20
Autoři: Hentea, Mariana
Zdroj: Issues in Informing Science & Information Technology; 2005, Vol. 2, p169-178, 10p
Témata: COMPUTER security, UNIVERSITIES & colleges, MANAGEMENT information systems, COMPUTER software, DATABASE management, EDUCATION
Geografický termín: UNITED States
Nájsť tento článok vo Web of Science
Full Text Finder