Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 235,089,634 papers from all fields of science
Search
Sign In
Create Free Account
Database security
Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
28 relations
Access control
Application security
Application server
Authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2012
Review
2012
Attacks Due to SQL Injection & Their Prevention Method for Web-Application
S. Srivastava
,
Rajeev Ranjan
,
Kumar Tripathi
2012
Corpus ID: 11852447
-The use of web application has become increasingly popular in our daily life as reading news paper, making online payments for…
Expand
Review
2008
Review
2008
An overview of database security
Ma Xian-yan
2008
Corpus ID: 64231603
This paper starts from the definition of database security,discusses the problems of user authorization,access control,security…
Expand
Review
2008
Review
2008
Geospatial Database Security
Soon Ae Chun
,
V. Atluri
Handbook of Database Security
2008
Corpus ID: 33833805
Geospatial data refers to the resources associated with location information represented by longitude and latitude. Its…
Expand
2007
2007
Title: Adaptation Concepts for Mobile Database Security
A. Lubinski
2007
Corpus ID: 14810145
Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like…
Expand
Review
2006
Review
2006
An Overview of Database Security
Z. Yuqing
2006
Corpus ID: 203672558
Database technology is one of the most widely applied computer technologies,its security is becoming more and more important.This…
Expand
2004
2004
Development of Honeypot System Emulating Functions of Database Server
A. Čenys
,
Darius Rainys
,
Lukas Radvilavicius
,
Andrej Bielko
2004
Corpus ID: 15791289
Abstract : Possibilities to develop the honeypot type intrusion detection systems (IDS) for databases are discussed. Two types of…
Expand
Review
2004
Review
2004
Oracle Database 11g The Complete Reference
Kevin Loney
2004
Corpus ID: 59740910
Fri, 08 Dec 2006 18:52:00 GMT oracle database 11g the complete pdf Provides a single source reference for administering Oracle…
Expand
1993
1993
Access to Government-Held Information in the Computer Age: Applying Legal Doctrine to Emerging Technology
Matthew D. Bunker
,
Sigman L. Spilchal
,
B. Chamberlin
,
Linda A. M. Perry
1993
Corpus ID: 158127493
1990
1990
A General Framework for Database Security
J. Biskup
European Symposium on Research in Computer…
1990
Corpus ID: 47552519
The counter is provided with a plurality of digit wheels, the first order digit wheel thereof having a star wheel on one side, a…
Expand
Review
1989
Review
1989
SDDM-a prototype of a distributed architecture for database security
C. D. Jensen
,
Robert M. Kiel
,
R. D. Verjinski
[] Proceedings. Fifth International Conference on…
1989
Corpus ID: 13597477
A description is given of the secure distributed data management (SDDM) system, which is a prototype of a distributed…
Expand