Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Database security). Showing records 1 – 30 of 130 total matches.

[1] [2] [3] [4] [5]

Search Limiters

Last 2 Years | English Only

Degrees

Levels

Languages

Country

▼ Search Limiters


University of Johannesburg

1. Van der Merwe, Isak Pieter. Rolprofiele vir die bestuur van inligtingsekerheid.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

The aim of this study is to introduce a model that can be used to manage the security profiles by using a role… (more)

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van der Merwe, I. P. (2014). Rolprofiele vir die bestuur van inligtingsekerheid. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Thesis, University of Johannesburg. Accessed December 04, 2020. http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van der Merwe, Isak Pieter. “Rolprofiele vir die bestuur van inligtingsekerheid.” 2014. Web. 04 Dec 2020.

Vancouver:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10210/12066.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van der Merwe IP. Rolprofiele vir die bestuur van inligtingsekerheid. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12066

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

2. PHONHARATH, CHITTAPHONE. Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ.

Degree: 博士(工学), Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: Database Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

PHONHARATH, C. (n.d.). Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/10081

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

PHONHARATH, CHITTAPHONE. “Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed December 04, 2020. http://hdl.handle.net/10061/10081.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

PHONHARATH, CHITTAPHONE. “Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ.” Web. 04 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

PHONHARATH C. Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10061/10081.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

PHONHARATH C. Verification Methods for Security against Inference Attacks on XML and Relational Databases : XMLおよび関係データベースにおける推論攻撃に対する安全性検証法; XML オヨビ カンケイ データベース ニ オケル スイロン コウゲキ ニ タイスル アンゼンセイ ケンショウホウ. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/10081

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.


University of Hong Kong

3. 张叶. Query and access control over encrypted databases.

Degree: 2010, University of Hong Kong

Subjects/Keywords: Database security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

张叶. (2010). Query and access control over encrypted databases. (Thesis). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/133193

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

张叶. “Query and access control over encrypted databases.” 2010. Thesis, University of Hong Kong. Accessed December 04, 2020. http://hdl.handle.net/10722/133193.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

张叶. “Query and access control over encrypted databases.” 2010. Web. 04 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

张叶. Query and access control over encrypted databases. [Internet] [Thesis]. University of Hong Kong; 2010. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10722/133193.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

张叶. Query and access control over encrypted databases. [Thesis]. University of Hong Kong; 2010. Available from: http://hdl.handle.net/10722/133193

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

4. 王偉傑. Security and computability in database applications.

Degree: 2011, University of Hong Kong

Subjects/Keywords: Database security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

王偉傑. (2011). Security and computability in database applications. (Thesis). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/134802

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

王偉傑. “Security and computability in database applications.” 2011. Thesis, University of Hong Kong. Accessed December 04, 2020. http://hdl.handle.net/10722/134802.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

王偉傑. “Security and computability in database applications.” 2011. Web. 04 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

王偉傑. Security and computability in database applications. [Internet] [Thesis]. University of Hong Kong; 2011. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10722/134802.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

王偉傑. Security and computability in database applications. [Thesis]. University of Hong Kong; 2011. Available from: http://hdl.handle.net/10722/134802

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete
Not specified: Masters Thesis or Doctoral Dissertation


Dalhousie University

5. Alsirhani, Amjad. COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING.

Degree: Master of Computer Science, Faculty of Computer Science, 2014, Dalhousie University

 Cloud computing is a technology that facilitates the storing and managing of data in a decentralized manner. However, since the data is out of the… (more)

Subjects/Keywords: cloud computing; Security; database

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Alsirhani, A. (2014). COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/55980

Chicago Manual of Style (16th Edition):

Alsirhani, Amjad. “COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING.” 2014. Masters Thesis, Dalhousie University. Accessed December 04, 2020. http://hdl.handle.net/10222/55980.

MLA Handbook (7th Edition):

Alsirhani, Amjad. “COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING.” 2014. Web. 04 Dec 2020.

Vancouver:

Alsirhani A. COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING. [Internet] [Masters thesis]. Dalhousie University; 2014. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10222/55980.

Council of Science Editors:

Alsirhani A. COMBINING MULTIPLE ENCRYPTION ALGORITHMS AND A DISTRIBUTED SYSTEM TO IMPROVE DATABASE SECURITY IN CLOUD COMPUTING. [Masters Thesis]. Dalhousie University; 2014. Available from: http://hdl.handle.net/10222/55980


Cornell University

6. Bender, Gabriel. Reasoning About Information Disclosure In Relational Databases.

Degree: PhD, Computer Science, 2014, Cornell University

 Companies and organizations collect and use vast troves of sensitive user data whose release must be carefully controlled. In practice, the access policies that govern… (more)

Subjects/Keywords: Database Security; Access Control; Explainable Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bender, G. (2014). Reasoning About Information Disclosure In Relational Databases. (Doctoral Dissertation). Cornell University. Retrieved from http://hdl.handle.net/1813/38815

Chicago Manual of Style (16th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases.” 2014. Doctoral Dissertation, Cornell University. Accessed December 04, 2020. http://hdl.handle.net/1813/38815.

MLA Handbook (7th Edition):

Bender, Gabriel. “Reasoning About Information Disclosure In Relational Databases.” 2014. Web. 04 Dec 2020.

Vancouver:

Bender G. Reasoning About Information Disclosure In Relational Databases. [Internet] [Doctoral dissertation]. Cornell University; 2014. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/1813/38815.

Council of Science Editors:

Bender G. Reasoning About Information Disclosure In Relational Databases. [Doctoral Dissertation]. Cornell University; 2014. Available from: http://hdl.handle.net/1813/38815


University of Arkansas

7. Fuentes Tello, Victor. Enforcing database security on cloud using a trusted third party based model.

Degree: MS, 2017, University of Arkansas

  Cloud computing offers a considerable number of advantages to clients and organizations that use several capabilities to store sensitive data, interact with applications, or… (more)

Subjects/Keywords: Cloud computing; Database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fuentes Tello, V. (2017). Enforcing database security on cloud using a trusted third party based model. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/2438

Chicago Manual of Style (16th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Masters Thesis, University of Arkansas. Accessed December 04, 2020. https://scholarworks.uark.edu/etd/2438.

MLA Handbook (7th Edition):

Fuentes Tello, Victor. “Enforcing database security on cloud using a trusted third party based model.” 2017. Web. 04 Dec 2020.

Vancouver:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Internet] [Masters thesis]. University of Arkansas; 2017. [cited 2020 Dec 04]. Available from: https://scholarworks.uark.edu/etd/2438.

Council of Science Editors:

Fuentes Tello V. Enforcing database security on cloud using a trusted third party based model. [Masters Thesis]. University of Arkansas; 2017. Available from: https://scholarworks.uark.edu/etd/2438


University of Arkansas

8. Yaseen, Qussai. Mitigating Insider Threat in Relational Database Systems.

Degree: PhD, 2012, University of Arkansas

  The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that… (more)

Subjects/Keywords: Applied sciences; Information security; Insider threat; Relational database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yaseen, Q. (2012). Mitigating Insider Threat in Relational Database Systems. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/370

Chicago Manual of Style (16th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Doctoral Dissertation, University of Arkansas. Accessed December 04, 2020. https://scholarworks.uark.edu/etd/370.

MLA Handbook (7th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Web. 04 Dec 2020.

Vancouver:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Internet] [Doctoral dissertation]. University of Arkansas; 2012. [cited 2020 Dec 04]. Available from: https://scholarworks.uark.edu/etd/370.

Council of Science Editors:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Doctoral Dissertation]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/370


Nelson Mandela Metropolitan University

9. Gaadingwe, Tshepo Gaadingwe. A critical review of the IFIP TC11 Security Conference Series.

Degree: MTech, Faculty of Engineering, the Built Environment and Information Technology, 2007, Nelson Mandela Metropolitan University

 Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of… (more)

Subjects/Keywords: Database security; Data protection; Computers  – Access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gaadingwe, T. G. (2007). A critical review of the IFIP TC11 Security Conference Series. (Masters Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/507

Chicago Manual of Style (16th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Masters Thesis, Nelson Mandela Metropolitan University. Accessed December 04, 2020. http://hdl.handle.net/10948/507.

MLA Handbook (7th Edition):

Gaadingwe, Tshepo Gaadingwe. “A critical review of the IFIP TC11 Security Conference Series.” 2007. Web. 04 Dec 2020.

Vancouver:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Internet] [Masters thesis]. Nelson Mandela Metropolitan University; 2007. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10948/507.

Council of Science Editors:

Gaadingwe TG. A critical review of the IFIP TC11 Security Conference Series. [Masters Thesis]. Nelson Mandela Metropolitan University; 2007. Available from: http://hdl.handle.net/10948/507


University of Johannesburg

10. Van Heerden, Chris. Packaged software : security and controls audit review.

Degree: 2015, University of Johannesburg

M.Com.

In recent years large organisations that developed mainframe application software in-house are now purchasing software packages to replace these applications. These advanced packages incorporate… (more)

Subjects/Keywords: Auditing - Data processing; Software protection; Database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Van Heerden, C. (2015). Packaged software : security and controls audit review. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Thesis, University of Johannesburg. Accessed December 04, 2020. http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Van Heerden, Chris. “Packaged software : security and controls audit review.” 2015. Web. 04 Dec 2020.

Vancouver:

Van Heerden C. Packaged software : security and controls audit review. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10210/14536.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Van Heerden C. Packaged software : security and controls audit review. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/14536

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

11. Coetzee, Marijke. Information security with special reference to database interconnectivity.

Degree: 2008, University of Johannesburg

Information can be considered a company’s most valued asset and should be protected as such. In the past, companies allowed very limited access to corporate… (more)

Subjects/Keywords: web database security measures; database security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Coetzee, M. (2008). Information security with special reference to database interconnectivity. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Coetzee, Marijke. “Information security with special reference to database interconnectivity.” 2008. Thesis, University of Johannesburg. Accessed December 04, 2020. http://hdl.handle.net/10210/490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Coetzee, Marijke. “Information security with special reference to database interconnectivity.” 2008. Web. 04 Dec 2020.

Vancouver:

Coetzee M. Information security with special reference to database interconnectivity. [Internet] [Thesis]. University of Johannesburg; 2008. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10210/490.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Coetzee M. Information security with special reference to database interconnectivity. [Thesis]. University of Johannesburg; 2008. Available from: http://hdl.handle.net/10210/490

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

12. Eloff, Maria Margaretha. A multi-dimensional model for information security management.

Degree: 2011, University of Johannesburg

D.Phil.

Any organisation is dependent on its information technology resources. The challenges posed by new developments such as the World Wide Web and e-business, require… (more)

Subjects/Keywords: Information resources management; Data protection; Computer security; Database management security measures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Eloff, M. M. (2011). A multi-dimensional model for information security management. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/4158

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Eloff, Maria Margaretha. “A multi-dimensional model for information security management.” 2011. Thesis, University of Johannesburg. Accessed December 04, 2020. http://hdl.handle.net/10210/4158.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Eloff, Maria Margaretha. “A multi-dimensional model for information security management.” 2011. Web. 04 Dec 2020.

Vancouver:

Eloff MM. A multi-dimensional model for information security management. [Internet] [Thesis]. University of Johannesburg; 2011. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10210/4158.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Eloff MM. A multi-dimensional model for information security management. [Thesis]. University of Johannesburg; 2011. Available from: http://hdl.handle.net/10210/4158

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Johannesburg

13. Kennedy, Renita. Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing.

Degree: 2014, University of Johannesburg

M.Com. (Informatics)

Please refer to full text to view abstract

Subjects/Keywords: Database security; Computer security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kennedy, R. (2014). Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/12233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kennedy, Renita. “Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing.” 2014. Thesis, University of Johannesburg. Accessed December 04, 2020. http://hdl.handle.net/10210/12233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kennedy, Renita. “Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing.” 2014. Web. 04 Dec 2020.

Vancouver:

Kennedy R. Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing. [Internet] [Thesis]. University of Johannesburg; 2014. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10210/12233.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kennedy R. Die afdwinging van sekerheid en integriteit in 'n relasionele databasisomgewing. [Thesis]. University of Johannesburg; 2014. Available from: http://hdl.handle.net/10210/12233

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Illinois – Chicago

14. Sullivan, George Arnold. Ensuring Privacy in Web Applications through Locally Enforced Views.

Degree: 2017, University of Illinois – Chicago

 This thesis focuses on providing security for legacy web applications and their associated database systems. It does this by modifying queries on the way from… (more)

Subjects/Keywords: database security; web-application security; views; query modification

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sullivan, G. A. (2017). Ensuring Privacy in Web Applications through Locally Enforced Views. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/22080

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sullivan, George Arnold. “Ensuring Privacy in Web Applications through Locally Enforced Views.” 2017. Thesis, University of Illinois – Chicago. Accessed December 04, 2020. http://hdl.handle.net/10027/22080.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sullivan, George Arnold. “Ensuring Privacy in Web Applications through Locally Enforced Views.” 2017. Web. 04 Dec 2020.

Vancouver:

Sullivan GA. Ensuring Privacy in Web Applications through Locally Enforced Views. [Internet] [Thesis]. University of Illinois – Chicago; 2017. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10027/22080.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sullivan GA. Ensuring Privacy in Web Applications through Locally Enforced Views. [Thesis]. University of Illinois – Chicago; 2017. Available from: http://hdl.handle.net/10027/22080

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Hong Kong

15. Ho, Sze-lok. Technical solutions for conducting investigations in digital age.

Degree: 2012, University of Hong Kong

 Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and… (more)

Subjects/Keywords: Computer security.; Database security.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ho, S. (2012). Technical solutions for conducting investigations in digital age. (Thesis). University of Hong Kong. Retrieved from http://hdl.handle.net/10722/179989

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Ho, Sze-lok. “Technical solutions for conducting investigations in digital age.” 2012. Thesis, University of Hong Kong. Accessed December 04, 2020. http://hdl.handle.net/10722/179989.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Ho, Sze-lok. “Technical solutions for conducting investigations in digital age.” 2012. Web. 04 Dec 2020.

Vancouver:

Ho S. Technical solutions for conducting investigations in digital age. [Internet] [Thesis]. University of Hong Kong; 2012. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10722/179989.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Ho S. Technical solutions for conducting investigations in digital age. [Thesis]. University of Hong Kong; 2012. Available from: http://hdl.handle.net/10722/179989

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

16. Maphakela, Madidimalo Rabbie. A model for legal compliance in the South African banking sector : an information security perspective.

Degree: Faculty of Engineering, the Built Environment and Information Technology, 2008, Nelson Mandela Metropolitan University

 In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the… (more)

Subjects/Keywords: Database security  – South Africa; Computer security  – South Africa; Computer networks  – Security measures  – South Africa

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Maphakela, M. R. (2008). A model for legal compliance in the South African banking sector : an information security perspective. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/725

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Maphakela, Madidimalo Rabbie. “A model for legal compliance in the South African banking sector : an information security perspective.” 2008. Thesis, Nelson Mandela Metropolitan University. Accessed December 04, 2020. http://hdl.handle.net/10948/725.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Maphakela, Madidimalo Rabbie. “A model for legal compliance in the South African banking sector : an information security perspective.” 2008. Web. 04 Dec 2020.

Vancouver:

Maphakela MR. A model for legal compliance in the South African banking sector : an information security perspective. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2008. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10948/725.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Maphakela MR. A model for legal compliance in the South African banking sector : an information security perspective. [Thesis]. Nelson Mandela Metropolitan University; 2008. Available from: http://hdl.handle.net/10948/725

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Colorado State University

17. Urbanska, Malgorzata. Automated security analysis of the home computer.

Degree: MS(M.S.), Computer Science, 2014, Colorado State University

 Home computer users pose special challenges to the security of their machines. Often home computer users do not realize that their computer activities have repercussions… (more)

Subjects/Keywords: attacks and defenses; attack graphs; security personalization; security risk modeling; system security; vulnerability database

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Urbanska, M. (2014). Automated security analysis of the home computer. (Masters Thesis). Colorado State University. Retrieved from http://hdl.handle.net/10217/82538

Chicago Manual of Style (16th Edition):

Urbanska, Malgorzata. “Automated security analysis of the home computer.” 2014. Masters Thesis, Colorado State University. Accessed December 04, 2020. http://hdl.handle.net/10217/82538.

MLA Handbook (7th Edition):

Urbanska, Malgorzata. “Automated security analysis of the home computer.” 2014. Web. 04 Dec 2020.

Vancouver:

Urbanska M. Automated security analysis of the home computer. [Internet] [Masters thesis]. Colorado State University; 2014. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10217/82538.

Council of Science Editors:

Urbanska M. Automated security analysis of the home computer. [Masters Thesis]. Colorado State University; 2014. Available from: http://hdl.handle.net/10217/82538


Macquarie University

18. Fan, Xinyu. Access control on provenance.

Degree: 2018, Macquarie University

Empirical thesis.

Bibliography: pages 185-201.

1. Introduction  – 2. Literature review  – 3. PACLP : a Partition-Based Access Control Policy Language for Provenance  – 4.… (more)

Subjects/Keywords: Computer security; Computers  – Access control; Database security; big data; algorithms; cryptography; cyber security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Fan, X. (2018). Access control on provenance. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/1272316

Chicago Manual of Style (16th Edition):

Fan, Xinyu. “Access control on provenance.” 2018. Doctoral Dissertation, Macquarie University. Accessed December 04, 2020. http://hdl.handle.net/1959.14/1272316.

MLA Handbook (7th Edition):

Fan, Xinyu. “Access control on provenance.” 2018. Web. 04 Dec 2020.

Vancouver:

Fan X. Access control on provenance. [Internet] [Doctoral dissertation]. Macquarie University; 2018. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/1959.14/1272316.

Council of Science Editors:

Fan X. Access control on provenance. [Doctoral Dissertation]. Macquarie University; 2018. Available from: http://hdl.handle.net/1959.14/1272316


Kaunas University of Technology

19. Naujokas, Tomas. Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai.

Degree: Master, Informatics Engineering, 2013, Kaunas University of Technology

Šio darbo tikslas buvo sukurti reikalavimais grindžiamą duomenų saugumo ir matomumo metodų pasirinkimo bei jų kombinavimo metodinę medžiagą. Pateikti reikalavimas grindžiamą kompleksinės saugos modelį. Pašalinti… (more)

Subjects/Keywords: Duomenų bazė; Duomenų bazės valdymas; Serveris; Kompleksinė apsauga; Database; Database management; Server; Complex security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Naujokas, Tomas. (2013). Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Naujokas, Tomas. “Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai.” 2013. Masters Thesis, Kaunas University of Technology. Accessed December 04, 2020. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Naujokas, Tomas. “Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai.” 2013. Web. 04 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Naujokas, Tomas. Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai. [Internet] [Masters thesis]. Kaunas University of Technology; 2013. [cited 2020 Dec 04]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Naujokas, Tomas. Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai. [Masters Thesis]. Kaunas University of Technology; 2013. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


California State University – Sacramento

20. Song, Chunhui. SQL injection attacks and countermeasures.

Degree: MS, Computer Science, 2010, California State University – Sacramento

 SQL injection has become a predominant type of attacks that target web applications. It allows attackers to obtain unauthorized access to the back-end database by… (more)

Subjects/Keywords: Web database security; Database vulnerability; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Song, C. (2010). SQL injection attacks and countermeasures. (Masters Thesis). California State University – Sacramento. Retrieved from http://hdl.handle.net/10211.9/560

Chicago Manual of Style (16th Edition):

Song, Chunhui. “SQL injection attacks and countermeasures.” 2010. Masters Thesis, California State University – Sacramento. Accessed December 04, 2020. http://hdl.handle.net/10211.9/560.

MLA Handbook (7th Edition):

Song, Chunhui. “SQL injection attacks and countermeasures.” 2010. Web. 04 Dec 2020.

Vancouver:

Song C. SQL injection attacks and countermeasures. [Internet] [Masters thesis]. California State University – Sacramento; 2010. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10211.9/560.

Council of Science Editors:

Song C. SQL injection attacks and countermeasures. [Masters Thesis]. California State University – Sacramento; 2010. Available from: http://hdl.handle.net/10211.9/560


University of Montana

21. Ke, Mei. Computer database security and Oracle security implementation.

Degree: MS, 2001, University of Montana

Subjects/Keywords: Database security.; Database security. fast (OCoLC)fst00888063

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ke, M. (2001). Computer database security and Oracle security implementation. (Masters Thesis). University of Montana. Retrieved from https://scholarworks.umt.edu/etd/5092

Chicago Manual of Style (16th Edition):

Ke, Mei. “Computer database security and Oracle security implementation.” 2001. Masters Thesis, University of Montana. Accessed December 04, 2020. https://scholarworks.umt.edu/etd/5092.

MLA Handbook (7th Edition):

Ke, Mei. “Computer database security and Oracle security implementation.” 2001. Web. 04 Dec 2020.

Vancouver:

Ke M. Computer database security and Oracle security implementation. [Internet] [Masters thesis]. University of Montana; 2001. [cited 2020 Dec 04]. Available from: https://scholarworks.umt.edu/etd/5092.

Council of Science Editors:

Ke M. Computer database security and Oracle security implementation. [Masters Thesis]. University of Montana; 2001. Available from: https://scholarworks.umt.edu/etd/5092


Boston University

22. Meng, Xianrui. Privacy-preserving queries on encrypted databases.

Degree: PhD, Computer Science, 2016, Boston University

 In today's Internet, with the advent of cloud computing, there is a natural desire for enterprises, organizations, and end users to outsource increasingly large amounts… (more)

Subjects/Keywords: Computer science; Cryptography; Database security; Data management; Graph theory; Information security/privacy; Query processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Meng, X. (2016). Privacy-preserving queries on encrypted databases. (Doctoral Dissertation). Boston University. Retrieved from http://hdl.handle.net/2144/19739

Chicago Manual of Style (16th Edition):

Meng, Xianrui. “Privacy-preserving queries on encrypted databases.” 2016. Doctoral Dissertation, Boston University. Accessed December 04, 2020. http://hdl.handle.net/2144/19739.

MLA Handbook (7th Edition):

Meng, Xianrui. “Privacy-preserving queries on encrypted databases.” 2016. Web. 04 Dec 2020.

Vancouver:

Meng X. Privacy-preserving queries on encrypted databases. [Internet] [Doctoral dissertation]. Boston University; 2016. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/2144/19739.

Council of Science Editors:

Meng X. Privacy-preserving queries on encrypted databases. [Doctoral Dissertation]. Boston University; 2016. Available from: http://hdl.handle.net/2144/19739


University of Western Ontario

23. Shermin, Motahera. An Access Control Model for NoSQL Databases.

Degree: 2013, University of Western Ontario

 Current development platforms are web scale, unlike recent platforms which were just network scale. There has been a rapid evolution in computing paradigm that has… (more)

Subjects/Keywords: NoSQL; Access Control; RBAC; Document database; Security; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shermin, M. (2013). An Access Control Model for NoSQL Databases. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/1797

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shermin, Motahera. “An Access Control Model for NoSQL Databases.” 2013. Thesis, University of Western Ontario. Accessed December 04, 2020. https://ir.lib.uwo.ca/etd/1797.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shermin, Motahera. “An Access Control Model for NoSQL Databases.” 2013. Web. 04 Dec 2020.

Vancouver:

Shermin M. An Access Control Model for NoSQL Databases. [Internet] [Thesis]. University of Western Ontario; 2013. [cited 2020 Dec 04]. Available from: https://ir.lib.uwo.ca/etd/1797.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shermin M. An Access Control Model for NoSQL Databases. [Thesis]. University of Western Ontario; 2013. Available from: https://ir.lib.uwo.ca/etd/1797

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

24. Ragavan, Harini. Insider Threat Mitigation Models Based on Thresholds and Dependencies.

Degree: MS, 2012, University of Arkansas

  Insider threat causes great damage to data in any organization and is considered a serious issue. In spite of the presence of threat prevention… (more)

Subjects/Keywords: Applied sciences; Database security; Insider threats; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ragavan, H. (2012). Insider Threat Mitigation Models Based on Thresholds and Dependencies. (Masters Thesis). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/313

Chicago Manual of Style (16th Edition):

Ragavan, Harini. “Insider Threat Mitigation Models Based on Thresholds and Dependencies.” 2012. Masters Thesis, University of Arkansas. Accessed December 04, 2020. https://scholarworks.uark.edu/etd/313.

MLA Handbook (7th Edition):

Ragavan, Harini. “Insider Threat Mitigation Models Based on Thresholds and Dependencies.” 2012. Web. 04 Dec 2020.

Vancouver:

Ragavan H. Insider Threat Mitigation Models Based on Thresholds and Dependencies. [Internet] [Masters thesis]. University of Arkansas; 2012. [cited 2020 Dec 04]. Available from: https://scholarworks.uark.edu/etd/313.

Council of Science Editors:

Ragavan H. Insider Threat Mitigation Models Based on Thresholds and Dependencies. [Masters Thesis]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/313


University of Missouri – Kansas City

25. Acharya, Debargh, 1983-. Security in pervasive health care using location-based key generation schemes.

Degree: 2011, University of Missouri – Kansas City

 Remote health monitoring has tremendous potential to improve quality of health care services in modern and ubiquitous medical environments. It helps to cut the cost… (more)

Subjects/Keywords: Database security; Thesis  – University of Missouri – Kansas City  – Computer science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Acharya, Debargh, 1. (2011). Security in pervasive health care using location-based key generation schemes. (Thesis). University of Missouri – Kansas City. Retrieved from http://hdl.handle.net/10355/11369

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Acharya, Debargh, 1983-. “Security in pervasive health care using location-based key generation schemes.” 2011. Thesis, University of Missouri – Kansas City. Accessed December 04, 2020. http://hdl.handle.net/10355/11369.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Acharya, Debargh, 1983-. “Security in pervasive health care using location-based key generation schemes.” 2011. Web. 04 Dec 2020.

Vancouver:

Acharya, Debargh 1. Security in pervasive health care using location-based key generation schemes. [Internet] [Thesis]. University of Missouri – Kansas City; 2011. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10355/11369.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Acharya, Debargh 1. Security in pervasive health care using location-based key generation schemes. [Thesis]. University of Missouri – Kansas City; 2011. Available from: http://hdl.handle.net/10355/11369

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

26. Anglero, Diana. Access control models: Authorization mechanisms for database management systems.

Degree: Information Sciences and Technologies (GCCIS), 1985, Rochester Institute of Technology

None provided. Advisors/Committee Members: Etlinger, Henry.

Subjects/Keywords: Database management systems; Data security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Anglero, D. (1985). Access control models: Authorization mechanisms for database management systems. (Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/5752

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Anglero, Diana. “Access control models: Authorization mechanisms for database management systems.” 1985. Thesis, Rochester Institute of Technology. Accessed December 04, 2020. https://scholarworks.rit.edu/theses/5752.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Anglero, Diana. “Access control models: Authorization mechanisms for database management systems.” 1985. Web. 04 Dec 2020.

Vancouver:

Anglero D. Access control models: Authorization mechanisms for database management systems. [Internet] [Thesis]. Rochester Institute of Technology; 1985. [cited 2020 Dec 04]. Available from: https://scholarworks.rit.edu/theses/5752.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Anglero D. Access control models: Authorization mechanisms for database management systems. [Thesis]. Rochester Institute of Technology; 1985. Available from: https://scholarworks.rit.edu/theses/5752

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

27. Bai, Kun. Damage Management in Database Management Systems.

Degree: 2010, Penn State University

 In the past two decades there have been many advances in the field of computer security. However, since vulnerabilities cannot be completely removed from a… (more)

Subjects/Keywords: Security; Data Damage; Database; Integrity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bai, K. (2010). Damage Management in Database Management Systems. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/10565

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2010. Thesis, Penn State University. Accessed December 04, 2020. https://submit-etda.libraries.psu.edu/catalog/10565.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bai, Kun. “Damage Management in Database Management Systems.” 2010. Web. 04 Dec 2020.

Vancouver:

Bai K. Damage Management in Database Management Systems. [Internet] [Thesis]. Penn State University; 2010. [cited 2020 Dec 04]. Available from: https://submit-etda.libraries.psu.edu/catalog/10565.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bai K. Damage Management in Database Management Systems. [Thesis]. Penn State University; 2010. Available from: https://submit-etda.libraries.psu.edu/catalog/10565

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

28. Wang, Hai. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM .

Degree: 2008, Penn State University

 The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to overcome these vulnerabilities.… (more)

Subjects/Keywords: Intrusion Tolerance; Survivability; Database Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, H. (2008). MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/7886

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Hai. “MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM .” 2008. Thesis, Penn State University. Accessed December 04, 2020. https://submit-etda.libraries.psu.edu/catalog/7886.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Hai. “MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM .” 2008. Web. 04 Dec 2020.

Vancouver:

Wang H. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM . [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 04]. Available from: https://submit-etda.libraries.psu.edu/catalog/7886.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang H. MODELING AND EVALUATING THE SURVIVABILITY OF AN INTRUSION TOLERANT DATABASE SYSTEM . [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/7886

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Anna University

29. Marikkannan M. Intelligent temporal reasoning Using rules for temporal database Security;.

Degree: Intelligent temporal reasoning Using rules for temporal database Security, 2015, Anna University

In this thesis an intelligent temporal database management system newlinewhich is capable of performing temporal reasoning and temporal mining in newlineorder to provide effective security(more)

Subjects/Keywords: database Security; Information and Communication engineering; Intelligent temporal reasoning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

M, M. (2015). Intelligent temporal reasoning Using rules for temporal database Security;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/43078

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

M, Marikkannan. “Intelligent temporal reasoning Using rules for temporal database Security;.” 2015. Thesis, Anna University. Accessed December 04, 2020. http://shodhganga.inflibnet.ac.in/handle/10603/43078.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

M, Marikkannan. “Intelligent temporal reasoning Using rules for temporal database Security;.” 2015. Web. 04 Dec 2020.

Vancouver:

M M. Intelligent temporal reasoning Using rules for temporal database Security;. [Internet] [Thesis]. Anna University; 2015. [cited 2020 Dec 04]. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/43078.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

M M. Intelligent temporal reasoning Using rules for temporal database Security;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/43078

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Nelson Mandela Metropolitan University

30. Adlam, Ryno. Applying blockchain technology to aspects of electronic health records in South Africa: lessons learnt.

Degree: 2020, Nelson Mandela Metropolitan University

 The purpose of this study was to explore the applicability of blockchain technology as a viable alternative for the secure storage and distribution of electronic… (more)

Subjects/Keywords: Blockchains (Databases); Database security; Data protection; Medical records  – Data processing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adlam, R. (2020). Applying blockchain technology to aspects of electronic health records in South Africa: lessons learnt. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/45996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Adlam, Ryno. “Applying blockchain technology to aspects of electronic health records in South Africa: lessons learnt.” 2020. Thesis, Nelson Mandela Metropolitan University. Accessed December 04, 2020. http://hdl.handle.net/10948/45996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Adlam, Ryno. “Applying blockchain technology to aspects of electronic health records in South Africa: lessons learnt.” 2020. Web. 04 Dec 2020.

Vancouver:

Adlam R. Applying blockchain technology to aspects of electronic health records in South Africa: lessons learnt. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2020. [cited 2020 Dec 04]. Available from: http://hdl.handle.net/10948/45996.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Adlam R. Applying blockchain technology to aspects of electronic health records in South Africa: lessons learnt. [Thesis]. Nelson Mandela Metropolitan University; 2020. Available from: http://hdl.handle.net/10948/45996

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4] [5]

.