EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"database security"
Narrow search

Narrow search

Year of publication
Subject
All
database security 6 Database security 3 Data security 2 Database 2 Database Security 2 Datenbank 2 Datensicherheit 2 Electronic Commerce 2 Electronic commerce 2 Privacy 2 Business Continuity Planning 1 Cloud Security 1 Cluster analysis Computer programs 1 Collaborative filtering 1 Computer file 1 Data mining 1 Data obfuscation 1 Data privacy 1 Data protection 1 Datenschutz 1 Datensicherung 1 Engineering 1 Federated database security 1 Governance and Risk Compliance 1 Higher education institution 1 Hochschule 1 IT crime 1 IT-Kriminalität 1 Information storage and retrieval systems 1 Law and legislation 1 Life Sciences 1 MOOC 1 Medicine and Health Sciences 1 NIST 1 OCTAVE 1 ORACLE <Datenbanksystem> 1 Operational 1 Oracle 1 Physical Sciences and Mathematics 1 Public enterprise 1
more ... less ...
Online availability
All
Free 4 Undetermined 4
Type of publication
All
Article 8 Book / Working Paper 3 Other 1
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2 Thesis 1
Language
All
English 8 Undetermined 4
Author
All
Abel, John 1 Amjad, Haseeb 1 Bharathi, S. Vijayakumar 1 Bhatti, Rafae 1 Brankovic, Ljiljana 1 Eltabakh, Mohamed 1 FUSARU, Doina 1 Funaseeli, N. 1 Garfinkel, Robert 1 Ghafoor, Arif 1 Giggins, Helen 1 Goes, Paulo 1 Gopal, Ram 1 Haddad, Hisham M. 1 Lebron, David 1 Lupu, Rubana 1 Magura, Zorodzai 1 Mala, D. Jeya 1 Matsuura, Jeffrey H. 1 Musungwini, Samuel 1 Parameswaran, Rupa 1 Pramod, Dhanya 1 REDNIC, Emanuil 1 Samuel, Arjmand 1 Shahriar, Hossain 1 TOMA, Andrei 1 Zhou, Tinashe Gwendolyn 1 ŞERBAN, Mariuţa 1
more ... less ...
Institution
All
The Unviersity of Newcastle. Faculty of Engineering & Built Environment, School of Electrical Engineering and Computer Science 1
Published in...
All
African journal of science, technology, innovation and development : AJSTID 1 Annals of Spiru Haret University, Economic Series 1 Informatica Economica 1 International Journal of Secure Software Engineering (IJSSE) 1 International journal of information systems and change management : IJISCM 1 Journal of Cases on Information Technology (JCIT) 1 Management Science 1
more ... less ...
Source
All
BASE 3 RePEc 3 ECONIS (ZBW) 2 USB Cologne (EcoSocSci) 2 Other ZBW resources 2
Showing 1 - 10 of 12
Cover Image
A guiding framework for enhancing database security in state-owned universities in Zimbabwe
Magura, Zorodzai; Zhou, Tinashe Gwendolyn; Musungwini, … - In: African journal of science, technology, innovation and … 14 (2022) 7, pp. 1761-1775
Persistent link: https://www.econbiz.de/10013454987
Saved in:
Cover Image
Developing an Information Security Risk Taxonomy and an Assessment Model using Fuzzy Petri Nets
Pramod, Dhanya; Bharathi, S. Vijayakumar - In: Journal of Cases on Information Technology (JCIT) 20 (2018) 3, pp. 48-69
In the digital era, organization-wide information security risk assessment has gained importance because it can impact businesses in many ways. In this article, the authors propose a model to assess the information security risk using Fuzzy Petri Nets (FPN). Deeply rooted in the OCTAVE...
Persistent link: https://www.econbiz.de/10012048917
Saved in:
Cover Image
Securing web applications from SQLIA using progressive detector
Funaseeli, N.; Mala, D. Jeya - In: International journal of information systems and change … 9 (2017) 1, pp. 44-69
Persistent link: https://www.econbiz.de/10011850380
Saved in:
Cover Image
Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications
Shahriar, Hossain; Haddad, Hisham M.; Lebron, David; … - In: International Journal of Secure Software Engineering (IJSSE) 7 (2016) 4, pp. 1-18
Massive Open Online Courses (MOOCs) are commonly hosted as web servers for learners worldwide to access education and learning materials at low cost. Many of the well-known MOOCs have adopted open source software and database technologies and frequently operate within cloud environments. It is...
Persistent link: https://www.econbiz.de/10012048077
Saved in:
Cover Image
Multimedia Flavor in Directory Services Environment
REDNIC, Emanuil; TOMA, Andrei - In: Informatica Economica 13 (2009) 3, pp. 59-66
The present article aims to present the extended functionality of LDAP based systems (known as Directory Services) of handling multimedia information such as photographs. The most frequently used are JPEG encoded photos. Furthermore this article will explain how this multimedia functionality can...
Persistent link: https://www.econbiz.de/10009416570
Saved in:
Cover Image
Statistical database security
Brankovic, Ljiljana; Giggins, Helen - 2007
Statistical database security focuses on the protection of confidential individual values stored in so …
Persistent link: https://www.econbiz.de/10009480741
Saved in:
Cover Image
Engineering a Policy-Based System for Federated Healthcare Databases
Bhatti, Rafae; Samuel, Arjmand; Eltabakh, Mohamed; … - 2007
Policy-based management for federated healthcare systems have recently gained increasing attention due to strict privacy and disclosure rules. While the work on privacy languages and enforcement mechanisms, such as Hippocratic databases, has advanced our understanding of designing...
Persistent link: https://www.econbiz.de/10009483165
Saved in:
Cover Image
A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering
Parameswaran, Rupa - 2006
Privacy is defined as the freedom from unauthorized intrusion. The availability of personal information through online databases, such as government records, medical records, and voters and #146; lists, pose a threat to personal privacy. The concern over individual privacy has led to the...
Persistent link: https://www.econbiz.de/10009476035
Saved in:
Cover Image
ENCRYPTION ALGORITHMS FOR DATABASES
FUSARU, Doina; ŞERBAN, Mariuţa - In: Annals of Spiru Haret University, Economic Series 1 (2010) 2, pp. 207-214
For most cases, people use an ecrypted mode when sending personal information to a server, via an electronic form. Whenever shopping is done online, the browser uses cryptographic methods to send to the server the credit card number and private information. Thanks to the surprising development...
Persistent link: https://www.econbiz.de/10008830058
Saved in:
Cover Image
Oracle e-business suite security
Abel, John - 2006
Persistent link: https://www.econbiz.de/10004870104
Saved in:
  • 1
  • 2
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...