Search Results - acm: h.: information systems/h.2: database management/h.2.0: general/h.2.0.0: security
-
1
Authors: et al.
Contributors: et al.
Source: ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011) ; https://hal.science/hal-01125862 ; ICSE 2011 : 33rd International Conference on Software Engineering, 7th International Workshops on Software Engineering for Secure Systems (SESS 2011), May 2011, Waikiki, Honolulu, Hawaii, United States. pp.22-28, ⟨10.1145/1988630.1988635⟩
Subject Terms: Model Driven Approach, Information System, Security, Sécurité, Système d'information, Approche Model Driven, ACM: H.: Information Systems/H.1: MODELS AND PRINCIPLES, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.0: General, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO]Computer Science [cs], [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]
Subject Geographic: Waikiki, Honolulu, Hawaii, United States
-
2
Authors: Hawley, Douglas
Source: Proceedings of the International Conference on Cyber Warfare & Security; 2019, p116-122, 7p
-
3
Authors:
Source: Communications of the ACM; Apr2008, Vol. 51 Issue 4, p64-68, 5p, 4 Charts
-
4
Authors:
Source: ACM Transactions on Database Systems; Dec99, Vol. 24 Issue 4, p487-493, 7p
-
5
Authors: Okunola, Abiodun
-
6
Authors:
Source: Communications of the ACM; Mar1976, Vol. 19 Issue 3, p148-159, 12p, 6 Diagrams
-
7
Authors: et al.
Contributors: et al.
Subject Terms: Personal cloud, ACM: B.: Hardware, access control, embedded database, [INFO.INFO-ES] Computer Science [cs]/Embedded Systems, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-CY] Computer Science [cs]/Computers and Society [cs.CY], [INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY], [INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET], [INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET], [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, secure hardware, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
Access URL: https://hal.science/hal-01427725v1
-
8
Differential privacy for relational algebra: improving the sensitivity bounds via constraint systems
Authors: et al.
Contributors: et al.
Source: QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages ; https://inria.hal.science/hal-00760688 ; QAPL - Tenth Workshop on Quantitative Aspects of Programming Languages, Apr 2012, Tallin, Estonia. pp.92-105, ⟨10.4204/EPTCS.85.7⟩
Subject Terms: ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT/H.2.3: Languages/H.2.3.3: Query languages, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection, [INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]
Time: Tallin, Estonia
-
9
Authors: et al.
Contributors: et al.
Source: ISSN: 1865-0929 ; Communications in Computer and Information Science ; https://hal.science/hal-01865880 ; Communications in Computer and Information Science, 909, pp.91-102, 2018, New Trends in Databases and Information Systems - ADBIS 2018 Short Papers and Workshops, ⟨10.1007/978-3-030-00063-9⟩ ; https://link.springer.com/book/10.1007/978-3-030-00063-9.
Subject Terms: Big Data, Management, Analytics, Data Privacy, Security, ACM: H.: Information Systems/H.2: DATABASE MANAGEMENT, ACM: H.: Information Systems/H.3: INFORMATION STORAGE AND RETRIEVAL, ACM: I.: Computing Methodologies/I.2: ARTIFICIAL INTELLIGENCE, ACM: K.: Computing Milieux/K.5: LEGAL ASPECTS OF COMPUTING, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS, [INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
10
Source: Communications of the ACM; Sep76, Vol. 19 Issue 9, p531-537, 3p
-
11
Authors:
Source: ACM Transactions on Multimedia Computing, Communications & Applications; 2021Supplement, Vol. 17 Issue 2s, p1-17, 17p
-
12
Source: Multimedia Tools & Applications; Apr2007, Vol. 33 Issue 1, p13-29, 17p
Subject Terms: MULTIMEDIA systems, DATABASE management, COMPUTER security, PRIVACY
-
13
Authors:
Source: Journal of Intelligent Information Systems; Feb2012, Vol. 38 Issue 1, p131-159, 29p
-
14
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, H.2.7 [Database Management, Database Administration—Security, integrity, and protection, K.6.5 [Management of Computing and Information Systems, Security and Protection General Terms, Security, Design Additional Key Words and Phrases, Applied cryptography, digital signature, secure audit logging, forward security, signature aggregation ACM Reference Format
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.3671; http://www4.ncsu.edu/~aayavuz/TISSEC2012.pdf
-
15
Authors:
Source: ACM Transactions on Database Systems; Jul2010, Vol. 35 Issue 3, p21-21:41, 41p, 5 Diagrams, 1 Chart
-
16
Authors:
Source: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 13 Issue 1, p5-5.27, 27p, 2 Charts
-
17
Authors:
Source: EPJ Web of Conferences; 11/20/2025, Vol. 341, p1-13, 13p
-
18
Authors:
Source: Journal of Intelligent Manufacturing; Aug2012, Vol. 23 Issue 4, p941-953, 13p
-
19
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, H.2.0 [Database Management, General—Security, integrity, and protection, K.6.5 [Management of Computing and Information Systems, Security and Protection—Authentication General Terms, Experimentation, Human Factors, Security Additional Key Words and Phrases, Access control, policy inference, machine learning ACM Reference Format
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.491; http://www.cs.unc.edu/~reiter/papers/2011/TISSEC1.pdf
-
20
Authors: Hentea, Mariana
Source: Issues in Informing Science & Information Technology; 2005, Vol. 2, p169-178, 10p
Subject Terms: COMPUTER security, UNIVERSITIES & colleges, MANAGEMENT information systems, COMPUTER software, DATABASE management, EDUCATION
Geographic Terms: UNITED States
Nájsť tento článok vo Web of Science
Full Text Finder