Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Database security ). Showing records 1 – 30 of 117 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


California State University – Sacramento

1. Song, Chunhui. SQL injection attacks and countermeasures.

Degree: MS, Computer Science, 2010, California State University – Sacramento

 SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by… (more)

Subjects/Keywords: Web database security; Database vulnerability; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, C. (2010). SQL injection attacks and countermeasures. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/560

Chicago Manual of Style (16th Edition):

Song, Chunhui. “SQL injection attacks and countermeasures.” 2010. Masters Thesis, California State University – Sacramento. Accessed October 23, 2019. http://hdl.handle.net/10211.9/560.

MLA Handbook (7th Edition):

Song, Chunhui. “SQL injection attacks and countermeasures.” 2010. Web. 23 Oct 2019.

Vancouver:

Song C. SQL injection attacks and countermeasures. [Internet] [Masters thesis]. California State University – Sacramento; 2010. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10211.9/560.

Council of Science Editors:

Song C. SQL injection attacks and countermeasures. [Masters Thesis]. California State University – Sacramento; 2010. Available from: http://hdl.handle.net/10211.9/560


University of Hong Kong

2. 何思樂.; Ho, Sze-lok. Technical solutions for conducting investigations in digital age.

Degree: M. Phil., 2012, University of Hong Kong

Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and… (more)

Subjects/Keywords: Computer security.; Database security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

何思樂.; Ho, S. (2012). Technical solutions for conducting investigations in digital age. (Masters Thesis). University of Hong Kong. Retrieved from Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989

Chicago Manual of Style (16th Edition):

何思樂.; Ho, Sze-lok. “Technical solutions for conducting investigations in digital age.” 2012. Masters Thesis, University of Hong Kong. Accessed October 23, 2019. Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989.

MLA Handbook (7th Edition):

何思樂.; Ho, Sze-lok. “Technical solutions for conducting investigations in digital age.” 2012. Web. 23 Oct 2019.

Vancouver:

何思樂.; Ho S. Technical solutions for conducting investigations in digital age. [Internet] [Masters thesis]. University of Hong Kong; 2012. [cited 2019 Oct 23]. Available from: Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989.

Council of Science Editors:

何思樂.; Ho S. Technical solutions for conducting investigations in digital age. [Masters Thesis]. University of Hong Kong; 2012. Available from: Ho, S. [何思樂]. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4852180 ; http://dx.doi.org/10.5353/th_b4852180 ; http://hdl.handle.net/10722/179989


University of Johannesburg

3. Van der Merwe, Isak Pieter. Rolprofiele vir die bestuur van inligtingsekerheid.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The aim of this study is to introduce a model that can be used to manage the security profiles by using a role… (more)

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, I. P. (2014). Rolprofiele vir die bestuur van inligtingsekerheid. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Thesis, University of Johannesburg. Accessed October 23, 2019. http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Web. 23 Oct 2019.

Vancouver:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

4. PHONHARATH, CHITTAPHONE. Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ.

Degree: 博士(工学), Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Database Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

PHONHARATH, C. (n.d.). Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/10081

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

PHONHARATH, CHITTAPHONE. “Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed October 23, 2019. http://hdl.handle.net/10061/10081.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

PHONHARATH, CHITTAPHONE. “Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ.” Web. 23 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

PHONHARATH C. Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10061/10081.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

PHONHARATH C. Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/10081

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Hong Kong

5. Zhang, Ye. Query and access control over encrypted databases.

Degree: M. Phil., 2010, University of Hong Kong

published_or_final_version

Computer Science

Master

Master of Philosophy

Advisors/Committee Members: Cheung, DWL, Mamoulis, N.

Subjects/Keywords: Database security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Y. (2010). Query and access control over encrypted databases. (Masters Thesis). University of Hong Kong. Retrieved from Zhang, Y. [张叶]. (2010). Query and access control over encrypted databases. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4568972 ; http://dx.doi.org/10.5353/th_b4568972 ; http://hdl.handle.net/10722/133193

Chicago Manual of Style (16th Edition):

Zhang, Ye. “Query and access control over encrypted databases.” 2010. Masters Thesis, University of Hong Kong. Accessed October 23, 2019. Zhang, Y. [张叶]. (2010). Query and access control over encrypted databases. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4568972 ; http://dx.doi.org/10.5353/th_b4568972 ; http://hdl.handle.net/10722/133193.

MLA Handbook (7th Edition):

Zhang, Ye. “Query and access control over encrypted databases.” 2010. Web. 23 Oct 2019.

Vancouver:

Zhang Y. Query and access control over encrypted databases. [Internet] [Masters thesis]. University of Hong Kong; 2010. [cited 2019 Oct 23]. Available from: Zhang, Y. [张叶]. (2010). Query and access control over encrypted databases. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4568972 ; http://dx.doi.org/10.5353/th_b4568972 ; http://hdl.handle.net/10722/133193.

Council of Science Editors:

Zhang Y. Query and access control over encrypted databases. [Masters Thesis]. University of Hong Kong; 2010. Available from: Zhang, Y. [张叶]. (2010). Query and access control over encrypted databases. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4568972 ; http://dx.doi.org/10.5353/th_b4568972 ; http://hdl.handle.net/10722/133193


University of Hong Kong

6. Wong, Wai-kit. Security and computability in database applications.

Degree: PhD, 2011, University of Hong Kong

published_or_final_version

Computer Science

Doctoral

Doctor of Philosophy

Advisors/Committee Members: Wang, WP, Cheung, DWL.

Subjects/Keywords: Database security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wong, W. (2011). Security and computability in database applications. (Doctoral Dissertation). University of Hong Kong. Retrieved from Wong, W. [王偉傑]. (2011). Security and computability in database applications. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4607787 ; http://dx.doi.org/10.5353/th_b4607787 ; http://hdl.handle.net/10722/134802

Chicago Manual of Style (16th Edition):

Wong, Wai-kit. “Security and computability in database applications.” 2011. Doctoral Dissertation, University of Hong Kong. Accessed October 23, 2019. Wong, W. [王偉傑]. (2011). Security and computability in database applications. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4607787 ; http://dx.doi.org/10.5353/th_b4607787 ; http://hdl.handle.net/10722/134802.

MLA Handbook (7th Edition):

Wong, Wai-kit. “Security and computability in database applications.” 2011. Web. 23 Oct 2019.

Vancouver:

Wong W. Security and computability in database applications. [Internet] [Doctoral dissertation]. University of Hong Kong; 2011. [cited 2019 Oct 23]. Available from: Wong, W. [王偉傑]. (2011). Security and computability in database applications. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4607787 ; http://dx.doi.org/10.5353/th_b4607787 ; http://hdl.handle.net/10722/134802.

Council of Science Editors:

Wong W. Security and computability in database applications. [Doctoral Dissertation]. University of Hong Kong; 2011. Available from: Wong, W. [王偉傑]. (2011). Security and computability in database applications. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4607787 ; http://dx.doi.org/10.5353/th_b4607787 ; http://hdl.handle.net/10722/134802


Penn State University

7. Bai, Kun. Damage Management in Database Management Systems.

Degree: PhD, Information Sciences and Technology, 2009, Penn State University

 In the past two decades there have been many advances in the field of computer security. However, since vulnerabilities cannot be completely removed from a… (more)

Subjects/Keywords: Security; Data Damage; Database; Integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bai, K. (2009). Damage Management in Database Management Systems. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/10565

Chicago Manual of Style (16th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2009. Doctoral Dissertation, Penn State University. Accessed October 23, 2019. https://etda.libraries.psu.edu/catalog/10565.

MLA Handbook (7th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2009. Web. 23 Oct 2019.

Vancouver:

Bai K. Damage Management in Database Management Systems. [Internet] [Doctoral dissertation]. Penn State University; 2009. [cited 2019 Oct 23]. Available from: https://etda.libraries.psu.edu/catalog/10565.

Council of Science Editors:

Bai K. Damage Management in Database Management Systems. [Doctoral Dissertation]. Penn State University; 2009. Available from: https://etda.libraries.psu.edu/catalog/10565


Dalhousie University

8. Alsirhani, Amjad. COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING.

Degree: Master of Computer Science, Faculty of Computer Science, 2014, Dalhousie University

 Cloud computing is a technology that facilitates the storing and managing of data in a decentralized manner. However, since the data is out of the… (more)

Subjects/Keywords: cloud computing; Security; database

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alsirhani, A. (2014). COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/55980

Chicago Manual of Style (16th Edition):

Alsirhani, Amjad. “COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING.” 2014. Masters Thesis, Dalhousie University. Accessed October 23, 2019. http://hdl.handle.net/10222/55980.

MLA Handbook (7th Edition):

Alsirhani, Amjad. “COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING.” 2014. Web. 23 Oct 2019.

Vancouver:

Alsirhani A. COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING. [Internet] [Masters thesis]. Dalhousie University; 2014. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10222/55980.

Council of Science Editors:

Alsirhani A. COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING. [Masters Thesis]. Dalhousie University; 2014. Available from: http://hdl.handle.net/10222/55980


University of Arkansas

9. Fuentes Tello, Victor. Enforcing database security on cloud using a trusted third party based model.

Degree: MS, 2017, University of Arkansas

  Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or… (more)

Subjects/Keywords: Cloud computing; Database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fuentes Tello, V. (2017). Enforcing database security on cloud using a trusted third party based model. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2438

Chicago Manual of Style (16th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Masters Thesis, University of Arkansas. Accessed October 23, 2019. https://scholarworks.uark.edu/etd/2438.

MLA Handbook (7th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Web. 23 Oct 2019.

Vancouver:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2019 Oct 23]. Available from: https://scholarworks.uark.edu/etd/2438.

Council of Science Editors:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2438


Cornell University

10. Bender, Gabriel. Reasoning About Information Disclosure In Relational Databases .

Degree: 2014, Cornell University

 Companies and organizations collect and use vast troves of sensitive user data whose release must be carefully controlled. In practice, the access policies that govern… (more)

Subjects/Keywords: Database Security; Access Control; Explainable Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bender, G. (2014). Reasoning About Information Disclosure In Relational Databases . (Thesis). Cornell University. Retrieved from http://hdl.handle.net/1813/38815

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases .” 2014. Thesis, Cornell University. Accessed October 23, 2019. http://hdl.handle.net/1813/38815.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases .” 2014. Web. 23 Oct 2019.

Vancouver:

Bender G. Reasoning About Information Disclosure In Relational Databases . [Internet] [Thesis]. Cornell University; 2014. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/1813/38815.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bender G. Reasoning About Information Disclosure In Relational Databases . [Thesis]. Cornell University; 2014. Available from: http://hdl.handle.net/1813/38815

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

11. Yaseen, Qussai. Mitigating Insider Threat in Relational Database Systems.

Degree: PhD, 2012, University of Arkansas

  The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that… (more)

Subjects/Keywords: Applied sciences; Information security; Insider threat; Relational database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yaseen, Q. (2012). Mitigating Insider Threat in Relational Database Systems. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/370

Chicago Manual of Style (16th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Doctoral Dissertation, University of Arkansas. Accessed October 23, 2019. https://scholarworks.uark.edu/etd/370.

MLA Handbook (7th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Web. 23 Oct 2019.

Vancouver:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Internet] [Doctoral dissertation]. University of Arkansas; 2012. [cited 2019 Oct 23]. Available from: https://scholarworks.uark.edu/etd/370.

Council of Science Editors:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Doctoral Dissertation]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/370


Nelson Mandela Metropolitan University

12. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed October 23, 2019. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 23 Oct 2019.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507


Delft University of Technology

13. Van Kouteren, H.J.W. Ibidas: to serve and to protect:.

Degree: 2009, Delft University of Technology

 In this thesis we present the database security mechanism and Web services implementation for the Ibidas system. The security mechanism restricts access to data by… (more)

Subjects/Keywords: Ibidas; data integration; web services; database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Kouteren, H. J. W. (2009). Ibidas: to serve and to protect:. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb

Chicago Manual of Style (16th Edition):

Van Kouteren, H J W. “Ibidas: to serve and to protect:.” 2009. Masters Thesis, Delft University of Technology. Accessed October 23, 2019. http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb.

MLA Handbook (7th Edition):

Van Kouteren, H J W. “Ibidas: to serve and to protect:.” 2009. Web. 23 Oct 2019.

Vancouver:

Van Kouteren HJW. Ibidas: to serve and to protect:. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2019 Oct 23]. Available from: http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb.

Council of Science Editors:

Van Kouteren HJW. Ibidas: to serve and to protect:. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:e1984070-ee92-47cb-b6b2-5dc0b08f77cb


University of Illinois – Urbana-Champaign

14. Olson, Lars E. Reflective Database Access Control.

Degree: PhD, Computer Science, 2009, University of Illinois – Urbana-Champaign

 Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static… (more)

Subjects/Keywords: Access Control; Database Systems; Formal Security Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Olson, L. E. (2009). Reflective Database Access Control. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/13853

Chicago Manual of Style (16th Edition):

Olson, Lars E. “Reflective Database Access Control.” 2009. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed October 23, 2019. http://hdl.handle.net/2142/13853.

MLA Handbook (7th Edition):

Olson, Lars E. “Reflective Database Access Control.” 2009. Web. 23 Oct 2019.

Vancouver:

Olson LE. Reflective Database Access Control. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2009. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/2142/13853.

Council of Science Editors:

Olson LE. Reflective Database Access Control. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2009. Available from: http://hdl.handle.net/2142/13853


University of Johannesburg

15. Van Heerden, Chris. Packaged software : security and controls audit review.

Degree: 2015, University of Johannesburg

M.Com.

In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate… (more)

Subjects/Keywords: Auditing - Data processing; Software protection; Database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Heerden, C. (2015). Packaged software : security and controls audit review. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Thesis, University of Johannesburg. Accessed October 23, 2019. http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Web. 23 Oct 2019.

Vancouver:

Van Heerden C. Packaged software : security and controls audit review. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Heerden C. Packaged software : security and controls audit review. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

16. Coetzee, Marijke. Information security with special reference to database interconnectivity.

Degree: 2008, University of Johannesburg

Information can be considered a company’s most valued asset and should be protected as such. In the past, companies allowed very limited access to corporate… (more)

Subjects/Keywords: web database security measures; database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coetzee, M. (2008). Information security with special reference to database interconnectivity. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coetzee, Marijke. “Information security with special reference to database interconnectivity.” 2008. Thesis, University of Johannesburg. Accessed October 23, 2019. http://hdl.handle.net/10210/490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coetzee, Marijke. “Information security with special reference to database interconnectivity.” 2008. Web. 23 Oct 2019.

Vancouver:

Coetzee M. Information security with special reference to database interconnectivity. [Internet] [Thesis]. University of Johannesburg; 2008. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10210/490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coetzee M. Information security with special reference to database interconnectivity. [Thesis]. University of Johannesburg; 2008. Available from: http://hdl.handle.net/10210/490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

17. Sullivan, George Arnold. Ensuring Privacy in Web Applications through Locally Enforced Views.

Degree: 2017, University of Illinois – Chicago

 This thesis focuses on providing security for legacy web applications and their associated database systems. It does this by modifying queries on the way from… (more)

Subjects/Keywords: database security; web-application security; views; query modification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sullivan, G. A. (2017). Ensuring Privacy in Web Applications through Locally Enforced Views. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/22080

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sullivan, George Arnold. “Ensuring Privacy in Web Applications through Locally Enforced Views.” 2017. Thesis, University of Illinois – Chicago. Accessed October 23, 2019. http://hdl.handle.net/10027/22080.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sullivan, George Arnold. “Ensuring Privacy in Web Applications through Locally Enforced Views.” 2017. Web. 23 Oct 2019.

Vancouver:

Sullivan GA. Ensuring Privacy in Web Applications through Locally Enforced Views. [Internet] [Thesis]. University of Illinois – Chicago; 2017. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10027/22080.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sullivan GA. Ensuring Privacy in Web Applications through Locally Enforced Views. [Thesis]. University of Illinois – Chicago; 2017. Available from: http://hdl.handle.net/10027/22080

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

18. Eloff, Maria Margaretha. A multi-dimensional model for information security management.

Degree: 2011, University of Johannesburg

D.Phil.

Any organisation is dependent on its information technology resources. The challenges posed by new developments such as the World Wide Web and e-business, require… (more)

Subjects/Keywords: Information resources management; Data protection; Computer security; Database management security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Eloff, M. M. (2011). A multi-dimensional model for information security management. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/4158

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Eloff, Maria Margaretha. “A multi-dimensional model for information security management.” 2011. Thesis, University of Johannesburg. Accessed October 23, 2019. http://hdl.handle.net/10210/4158.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Eloff, Maria Margaretha. “A multi-dimensional model for information security management.” 2011. Web. 23 Oct 2019.

Vancouver:

Eloff MM. A multi-dimensional model for information security management. [Internet] [Thesis]. University of Johannesburg; 2011. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10210/4158.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Eloff MM. A multi-dimensional model for information security management. [Thesis]. University of Johannesburg; 2011. Available from: http://hdl.handle.net/10210/4158

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

19. Kennedy, Renita. Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

Please refer to full text to view abstract

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kennedy, R. (2014). Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kennedy, Renita. “Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing.” 2014. Thesis, University of Johannesburg. Accessed October 23, 2019. http://hdl.handle.net/10210/12233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kennedy, Renita. “Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing.” 2014. Web. 23 Oct 2019.

Vancouver:

Kennedy R. Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10210/12233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kennedy R. Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

20. Maphakela, Madidimalo Rabbie. A model for legal compliance in the South African banking sector : an information security perspective.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the… (more)

Subjects/Keywords: Database security  – South Africa; Computer security  – South Africa; Computer networks  – Security measures  – South Africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maphakela, M. R. (2008). A model for legal compliance in the South African banking sector : an information security perspective. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/725

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maphakela, Madidimalo Rabbie. “A model for legal compliance in the South African banking sector : an information security perspective.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed October 23, 2019. http://hdl.handle.net/10948/725.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maphakela, Madidimalo Rabbie. “A model for legal compliance in the South African banking sector : an information security perspective.” 2008. Web. 23 Oct 2019.

Vancouver:

Maphakela MR. A model for legal compliance in the South African banking sector : an information security perspective. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10948/725.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maphakela MR. A model for legal compliance in the South African banking sector : an information security perspective. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/725

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kaunas University of Technology

21. Naujokas, Tomas. Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai.

Degree: Master, Informatics Engineering, 2013, Kaunas University of Technology

Šio darbo tikslas buvo sukurti reikalavimais grindžiamą duomenų saugumo ir matomumo metodų pasirinkimo bei jų kombinavimo metodinę medžiagą. Pateikti reikalavimas grindžiamą kompleksinės saugos modelį. Pašalinti… (more)

Subjects/Keywords: Duomenų bazė; Duomenų bazės valdymas; Serveris; Kompleksinė apsauga; Database; Database management; Server; Complex security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naujokas, Tomas. (2013). Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Naujokas, Tomas. “Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai.” 2013. Masters Thesis, Kaunas University of Technology. Accessed October 23, 2019. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Naujokas, Tomas. “Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai.” 2013. Web. 23 Oct 2019.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Naujokas, Tomas. Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai. [Internet] [Masters thesis]. Kaunas University of Technology; 2013. [cited 2019 Oct 23]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Naujokas, Tomas. Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai. [Masters Thesis]. Kaunas University of Technology; 2013. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Montana Tech

22. Ke, Mei. Computer database security and Oracle security implementation.

Degree: MS, 2001, Montana Tech

Subjects/Keywords: Database security.; Database security. fast (OCoLC)fst00888063

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ke, M. (2001). Computer database security and Oracle security implementation. (Masters Thesis). Montana Tech. Retrieved from https://scholarworks.umt.edu/etd/5092

Chicago Manual of Style (16th Edition):

Ke, Mei. “Computer database security and Oracle security implementation.” 2001. Masters Thesis, Montana Tech. Accessed October 23, 2019. https://scholarworks.umt.edu/etd/5092.

MLA Handbook (7th Edition):

Ke, Mei. “Computer database security and Oracle security implementation.” 2001. Web. 23 Oct 2019.

Vancouver:

Ke M. Computer database security and Oracle security implementation. [Internet] [Masters thesis]. Montana Tech; 2001. [cited 2019 Oct 23]. Available from: https://scholarworks.umt.edu/etd/5092.

Council of Science Editors:

Ke M. Computer database security and Oracle security implementation. [Masters Thesis]. Montana Tech; 2001. Available from: https://scholarworks.umt.edu/etd/5092


University of Western Ontario

23. Shermin, Motahera. An Access Control Model for NoSQL Databases.

Degree: 2013, University of Western Ontario

 Current development platforms are web scale, unlike recent platforms which were just network scale. There has been a rapid evolution in computing paradigm that has… (more)

Subjects/Keywords: NoSQL; Access Control; RBAC; Document database; Security; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shermin, M. (2013). An Access Control Model for NoSQL Databases. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/1797

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shermin, Motahera. “An Access Control Model for NoSQL Databases.” 2013. Thesis, University of Western Ontario. Accessed October 23, 2019. https://ir.lib.uwo.ca/etd/1797.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shermin, Motahera. “An Access Control Model for NoSQL Databases.” 2013. Web. 23 Oct 2019.

Vancouver:

Shermin M. An Access Control Model for NoSQL Databases. [Internet] [Thesis]. University of Western Ontario; 2013. [cited 2019 Oct 23]. Available from: https://ir.lib.uwo.ca/etd/1797.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shermin M. An Access Control Model for NoSQL Databases. [Thesis]. University of Western Ontario; 2013. Available from: https://ir.lib.uwo.ca/etd/1797

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Boston University

24. Meng, Xianrui. Privacy-preserving queries on encrypted databases.

Degree: PhD, Computer Science, 2016, Boston University

 In today's Internet, with the advent of cloud computing, there is a natural desire for enterprises, organizations, and end users to outsource increasingly large amounts… (more)

Subjects/Keywords: Computer science; Cryptography; Database security; Data management; Graph theory; Information security/privacy; Query processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meng, X. (2016). Privacy-preserving queries on encrypted databases. (Doctoral Dissertation). Boston University. Retrieved from http://hdl.handle.net/2144/19739

Chicago Manual of Style (16th Edition):

Meng, Xianrui. “Privacy-preserving queries on encrypted databases.” 2016. Doctoral Dissertation, Boston University. Accessed October 23, 2019. http://hdl.handle.net/2144/19739.

MLA Handbook (7th Edition):

Meng, Xianrui. “Privacy-preserving queries on encrypted databases.” 2016. Web. 23 Oct 2019.

Vancouver:

Meng X. Privacy-preserving queries on encrypted databases. [Internet] [Doctoral dissertation]. Boston University; 2016. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/2144/19739.

Council of Science Editors:

Meng X. Privacy-preserving queries on encrypted databases. [Doctoral Dissertation]. Boston University; 2016. Available from: http://hdl.handle.net/2144/19739


University of Arkansas

25. Ragavan, Harini. Insider Threat Mitigation Models Based on Thresholds and Dependencies.

Degree: MS, 2012, University of Arkansas

  Insider threat causes great damage to data in any organization and is considered a serious issue. In spite of the presence of threat prevention… (more)

Subjects/Keywords: Applied sciences; Database security; Insider threats; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ragavan, H. (2012). Insider Threat Mitigation Models Based on Thresholds and Dependencies. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/313

Chicago Manual of Style (16th Edition):

Ragavan, Harini. “Insider Threat Mitigation Models Based on Thresholds and Dependencies.” 2012. Masters Thesis, University of Arkansas. Accessed October 23, 2019. https://scholarworks.uark.edu/etd/313.

MLA Handbook (7th Edition):

Ragavan, Harini. “Insider Threat Mitigation Models Based on Thresholds and Dependencies.” 2012. Web. 23 Oct 2019.

Vancouver:

Ragavan H. Insider Threat Mitigation Models Based on Thresholds and Dependencies. [Internet] [Masters thesis]. University of Arkansas; 2012. [cited 2019 Oct 23]. Available from: https://scholarworks.uark.edu/etd/313.

Council of Science Editors:

Ragavan H. Insider Threat Mitigation Models Based on Thresholds and Dependencies. [Masters Thesis]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/313


Anna University

26. Marikkannan M. Intelligent temporal reasoning Using rules for temporal database Security;.

Degree: Intelligent temporal reasoning Using rules for temporal database Security, 2015, Anna University

In this thesis an intelligent temporal database management system newlinewhich is capable of performing temporal reasoning and temporal mining in newlineorder to provide effective security(more)

Subjects/Keywords: database Security; Information and Communication engineering; Intelligent temporal reasoning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

M, M. (2015). Intelligent temporal reasoning Using rules for temporal database Security;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/43078

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

M, Marikkannan. “Intelligent temporal reasoning Using rules for temporal database Security;.” 2015. Thesis, Anna University. Accessed October 23, 2019. http://shodhganga.inflibnet.ac.in/handle/10603/43078.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

M, Marikkannan. “Intelligent temporal reasoning Using rules for temporal database Security;.” 2015. Web. 23 Oct 2019.

Vancouver:

M M. Intelligent temporal reasoning Using rules for temporal database Security;. [Internet] [Thesis]. Anna University; 2015. [cited 2019 Oct 23]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/43078.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

M M. Intelligent temporal reasoning Using rules for temporal database Security;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/43078

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

27. Mysore, Praneet. Analysis of data provenance across various applications.

Degree: MS, Computer Science, 2013, California State University – Sacramento

 Data Provenance refers to the line of descent or the ancestry of information. It constitutes the origin of that data, along with some key events… (more)

Subjects/Keywords: Lineage; Security; Database history

…data is secure. The security of data is of paramount importance because it essentially… …security to our data, which may be present in various storage systems such as databases or even… …networks for that matter, it is also important to know exactly how much security needs to be… …implies that, under the scenario where a piece of data present in a database is modified in any… …Most of the data stored in a curated database is the result of a set of manual… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mysore, P. (2013). Analysis of data provenance across various applications. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/2085

Chicago Manual of Style (16th Edition):

Mysore, Praneet. “Analysis of data provenance across various applications.” 2013. Masters Thesis, California State University – Sacramento. Accessed October 23, 2019. http://hdl.handle.net/10211.9/2085.

MLA Handbook (7th Edition):

Mysore, Praneet. “Analysis of data provenance across various applications.” 2013. Web. 23 Oct 2019.

Vancouver:

Mysore P. Analysis of data provenance across various applications. [Internet] [Masters thesis]. California State University – Sacramento; 2013. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10211.9/2085.

Council of Science Editors:

Mysore P. Analysis of data provenance across various applications. [Masters Thesis]. California State University – Sacramento; 2013. Available from: http://hdl.handle.net/10211.9/2085


California State University – Sacramento

28. Hatwalne, Priyanka J. SQLiDetect: a web based intrusion detection system for SQL injections.

Degree: MS, Computer Science, 2012, California State University – Sacramento

 Databases often store personal information such as addresses, phone numbers, bank account details, and social security numbers. SQL injection attacks can cause serious threat to… (more)

Subjects/Keywords: Signature based pattern matching; Database security; Web based attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hatwalne, P. J. (2012). SQLiDetect: a web based intrusion detection system for SQL injections. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/1527

Chicago Manual of Style (16th Edition):

Hatwalne, Priyanka J. “SQLiDetect: a web based intrusion detection system for SQL injections.” 2012. Masters Thesis, California State University – Sacramento. Accessed October 23, 2019. http://hdl.handle.net/10211.9/1527.

MLA Handbook (7th Edition):

Hatwalne, Priyanka J. “SQLiDetect: a web based intrusion detection system for SQL injections.” 2012. Web. 23 Oct 2019.

Vancouver:

Hatwalne PJ. SQLiDetect: a web based intrusion detection system for SQL injections. [Internet] [Masters thesis]. California State University – Sacramento; 2012. [cited 2019 Oct 23]. Available from: http://hdl.handle.net/10211.9/1527.

Council of Science Editors:

Hatwalne PJ. SQLiDetect: a web based intrusion detection system for SQL injections. [Masters Thesis]. California State University – Sacramento; 2012. Available from: http://hdl.handle.net/10211.9/1527


Hong Kong University of Science and Technology

29. Yuan, Mingxuan. Privacy preserving graph data publication.

Degree: 2012, Hong Kong University of Science and Technology

 Nowadays, more and more people join social networks, such as Facebook, Linkedin, and Livespace, to share information and to monitor or participate in different activities.… (more)

Subjects/Keywords: Database security; Data protection; Online social networks; Privacy, Right of

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yuan, M. (2012). Privacy preserving graph data publication. (Thesis). Hong Kong University of Science and Technology. Retrieved from https://doi.org/10.14711/thesis-b1165750 ; http://repository.ust.hk/ir/bitstream/1783.1-7479/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yuan, Mingxuan. “Privacy preserving graph data publication.” 2012. Thesis, Hong Kong University of Science and Technology. Accessed October 23, 2019. https://doi.org/10.14711/thesis-b1165750 ; http://repository.ust.hk/ir/bitstream/1783.1-7479/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yuan, Mingxuan. “Privacy preserving graph data publication.” 2012. Web. 23 Oct 2019.

Vancouver:

Yuan M. Privacy preserving graph data publication. [Internet] [Thesis]. Hong Kong University of Science and Technology; 2012. [cited 2019 Oct 23]. Available from: https://doi.org/10.14711/thesis-b1165750 ; http://repository.ust.hk/ir/bitstream/1783.1-7479/1/th_redirect.html.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yuan M. Privacy preserving graph data publication. [Thesis]. Hong Kong University of Science and Technology; 2012. Available from: https://doi.org/10.14711/thesis-b1165750 ; http://repository.ust.hk/ir/bitstream/1783.1-7479/1/th_redirect.html

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

30. Wang, Hai. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM.

Degree: PhD, Information Sciences and Technology, 2007, Penn State University

 The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these vulnerabilities.… (more)

Subjects/Keywords: Intrusion Tolerance; Survivability; Database Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, H. (2007). MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM. (Doctoral Dissertation). Penn State University. Retrieved from https://etda.libraries.psu.edu/catalog/7886

Chicago Manual of Style (16th Edition):

Wang, Hai. “MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM.” 2007. Doctoral Dissertation, Penn State University. Accessed October 23, 2019. https://etda.libraries.psu.edu/catalog/7886.

MLA Handbook (7th Edition):

Wang, Hai. “MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM.” 2007. Web. 23 Oct 2019.

Vancouver:

Wang H. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM. [Internet] [Doctoral dissertation]. Penn State University; 2007. [cited 2019 Oct 23]. Available from: https://etda.libraries.psu.edu/catalog/7886.

Council of Science Editors:

Wang H. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM. [Doctoral Dissertation]. Penn State University; 2007. Available from: https://etda.libraries.psu.edu/catalog/7886

[1] [2] [3] [4]

.