Decuctive database security
From MaRDI portal
Publication:3375306
zbMATH Open1088.68559MaRDI QIDQ3375306FDOQ3375306
Authors: Steve Barker
Publication date: 7 March 2006
Recommendations
Cited In (11)
- Title not available (Why is that?)
- Protecting deductive databases from unauthorized retrieval and update requests
- Title not available (Why is that?)
- Identifying security holes in OLAP applications
- Protecting deductive databases from unauthorized retrievals
- Vertical fragmentation security study in distributed deductive databases
- On the deductive security of queries to databases with multi-bit records
- Title not available (Why is that?)
- On the deductive security of queries to confidential databases in cloud computing systems
- Information Security
- The implementation of the DBMS credentials protection method in the web applications
This page was built for publication: Decuctive database security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3375306)