Suchergebnisse - ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General/H.2.0.0: Security~
-
1
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011) ; https://hal.science/hal-01125862 ; ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011), May 2011, Waikiki, Honolulu, Hawaii, United States. pp.22-28, ⟨10.1145/1988630.1988635⟩
Schlagwörter: Model Driven Approach, Information System, Security, Sécurité, Système d'information, Approche Model Driven, ACM: H.: Information Systems/H.1: MODELS AND PRINCIPLES, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO]Computer Science [cs], [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
Geographisches Schlagwort: Waikiki, Honolulu, Hawaii, United States
-
2
Autoren: Hawley, Douglas
Quelle: Proceedings of the International Conference on Cyber Warfare & Security; 2019, p116-122, 7p
-
3
Autoren:
Quelle: Communications of the ACM; Apr2008, Vol. 51 Issue 4, p64-68, 5p, 4 Charts
-
4
Autoren:
Quelle: ACM Transactions on Database Systems; Dec99, Vol. 24 Issue 4, p487-493, 7p
-
5
Autoren: Okunola, Abiodun
-
6
Autoren:
Quelle: Communications of the ACM; Mar1976, Vol. 19 Issue 3, p148-159, 12p, 6 Diagrams
-
7
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Personal cloud, ACM: B.: Hardware, access control, embedded database, [INFO.INFO-ES] Computer Science [cs]/Embedded Systems, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY], [INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY], [INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET], [INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET], [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, secure hardware, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
Zugangs-URL: https://hal.science/hal-01427725v1
-
8
Differential privacy for relational algebra: improving the sensitivity bounds via constraint systems
Autoren: et al.
Weitere Verfasser: et al.
Quelle: QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages ; https://inria.hal.science/hal-00760688 ; QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages, Apr 2012, Tallin, Estonia. pp.92-105, ⟨10.4204/EPTCS.85.7⟩
Schlagwörter: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages/H.2.3.3: Query languages, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]
Time: Tallin, Estonia
-
9
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ISSN: 1865-0929 ; Communications in Computer and Information Science ; https://hal.science/hal-01865880 ; Communications in Computer and Information Science, 909, pp.91-102, 2018, New Trends in Databases and Information Systems - ADBIS 2018 Short Papers and Workshops, ⟨10.1007/978-3-030-00063-9⟩ ; https://link.springer.com/book/10.1007/978-3-030-00063-9.
Schlagwörter: Big Data, Management, Analytics, Data Privacy, Security, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.3: INFORMATION STORAGE AND RETRIEVAL, ACM: I.: Computing Methodologies/I.2: ARTIFICIAL INTELLIGENCE, ACM: K.: Computing Milieux/K.5: LEGAL ASPECTS OF COMPUTING, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
10
Quelle: Communications of the ACM; Sep76, Vol. 19 Issue 9, p531-537, 3p
-
11
Autoren:
Quelle: ACM Transactions on Multimedia Computing, Communications & Applications; 2021Supplement, Vol. 17 Issue 2s, p1-17, 17p
-
12
Quelle: Multimedia Tools & Applications; Apr2007, Vol. 33 Issue 1, p13-29, 17p
Schlagwörter: MULTIMEDIA systems, DATABASE management, COMPUTER security, PRIVACY
-
13
Autoren:
Quelle: Journal of Intelligent Information Systems; Feb2012, Vol. 38 Issue 1, p131-159, 29p
-
14
Autoren: et al.
Weitere Verfasser: et al.
Schlagwörter: Categories and Subject Descriptors, H.2.7 [Database Management, Database Administration—Security, integrity, and protection, K.6.5 [Management of Computing and Information Systems, Security and Protection General Terms, Security, Design Additional Key Words and Phrases, Applied cryptography, digital signature, secure audit logging, forward security, signature aggregation ACM Reference Format
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.3671; http://www4.ncsu.edu/~aayavuz/TISSEC2012.pdf
-
15
Autoren:
Quelle: ACM Transactions on Database Systems; Jul2010, Vol. 35 Issue 3, p21-21:41, 41p, 5 Diagrams, 1 Chart
-
16
Autoren:
Quelle: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 13 Issue 1, p5-5.27, 27p, 2 Charts
-
17
Autoren:
Quelle: EPJ Web of Conferences; 11/20/2025, Vol. 341, p1-13, 13p
-
18
Autoren:
Quelle: Journal of Intelligent Manufacturing; Aug2012, Vol. 23 Issue 4, p941-953, 13p
-
19
Autoren:
Weitere Verfasser:
Schlagwörter: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, H.2.0 [Database Management, General—Security, integrity, and protection, K.6.5 [Management of Computing and Information Systems, Security and Protection—Authentication General Terms, Experimentation, Human Factors, Security Additional Key Words and Phrases, Access control, policy inference, machine learning ACM Reference Format
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.491; http://www.cs.unc.edu/~reiter/papers/2011/TISSEC1.pdf
-
20
Autoren: Hentea, Mariana
Quelle: Issues in Informing Science & Information Technology; 2005, Vol. 2, p169-178, 10p
Schlagwörter: COMPUTER security, UNIVERSITIES & colleges, MANAGEMENT information systems, COMPUTER software, DATABASE management, EDUCATION
Geografische Kategorien: UNITED States
Nájsť tento článok vo Web of Science
Full Text Finder