Decuctive database security
From MaRDI portal
Publication:3375306
Recommendations
Cited in
(11)- scientific article; zbMATH DE number 839558 (Why is no real title available?)
- scientific article; zbMATH DE number 4191108 (Why is no real title available?)
- Protecting deductive databases from unauthorized retrieval and update requests
- Identifying security holes in OLAP applications
- Protecting deductive databases from unauthorized retrievals
- Vertical fragmentation security study in distributed deductive databases
- On the deductive security of queries to databases with multi-bit records
- On the deductive security of queries to confidential databases in cloud computing systems
- scientific article; zbMATH DE number 2090519 (Why is no real title available?)
- Information Security
- The implementation of the DBMS credentials protection method in the web applications
This page was built for publication: Decuctive database security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3375306)