All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Database security
Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
1978-2018
0
10
20
30
1978
2018
Related topics
Related topics
28 relations
Access control
Application security
Application server
Authentication
(More)
Related mentions per year
Related mentions per year
1936-2018
1940
1960
1980
2000
2020
Database security
Database
Authentication
Encryption
Table
Access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Database Security: What Students Need to Know
Meg Murray
,
Anthony Scime
,
Meg Murray
2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized…Â
(More)
Is this relevant?
2009
2009
Teaching database security and auditing
Li Yang
SIGCSE
2009
Hands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in…Â
(More)
Is this relevant?
2008
2008
Handbook of Database Security - Applications and Trends
Handbook of Database Security
2008
Now, we come to offer you the right catalogues of book to open. handbook of database security applications and trends is one of…Â
(More)
Is this relevant?
Review
2005
Review
2005
Database security - concepts, approaches, and challenges
Elisa Bertino
,
Ravi S. Sandhu
IEEE Transactions on Dependable and Secure…
2005
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more…Â
(More)
Is this relevant?
2004
2004
The Role of Cryptography in Database Security
Ueli Maurer
SIGMOD Conference
2004
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is…Â
(More)
Is this relevant?
1996
1996
Database Security and Privacy
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Pierangela Samarati
Computing Handbook, 3rd ed.
1996
—Policy. The first step is to develop a security or privacy policy. The policy precisely defines the requirements that are to be…Â
(More)
Is this relevant?
Review
1995
Review
1995
Database Security
Silvana Castano
,
Maria Grazia Fugini
,
Giancarlo Martella
,
Pierangela Samarati
IFIP Advances in Information and Communication…
1995
This paper describes security issues for data warehousing and data mining. It first provides an overview of data warehousing and…Â
(More)
Is this relevant?
1990
1990
Database Security
Teresa F. Lunt
,
Eduardo B. Fernández
IEEE Data Eng. Bull.
1990
Computer security is concerned with the ability of a computer system to enforce a security policy governing the disclosure…Â
(More)
Is this relevant?
Highly Cited
1986
Highly Cited
1986
Views for Multilevel Database Security
Dorothy E. Denning
,
Selim G. Akl
,
Matthew Morgenstern
,
Peter G. Neumann
,
Roger R. Schell
,
Mark R. Heckman
IEEE Transactions on Software Engineering
1986
Because views on relational database systems mathematically define arbitrary sets of stored and derived data, they have been…Â
(More)
Is this relevant?
1984
1984
Cryptographic Checksums for Multilevel Database Security
Dorothy E. Denning
1984 IEEE Symposium on Security and Privacy
1984
The 1982 ilr Force Summer Study on Multilevel Data Management Security recommended several approaches to designing a multilevel…Â
(More)
Is this relevant?