Database security

Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1978-2018
010203019782018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Hands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in… (More)
Is this relevant?
2008
2008
  • Handbook of Database Security
  • 2008
Now, we come to offer you the right catalogues of book to open. handbook of database security applications and trends is one of… (More)
Is this relevant?
Review
2005
Review
2005
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more… (More)
Is this relevant?
2004
2004
In traditional database security research, the database is usually assumed to be trustworthy. Under this assumption, the goal is… (More)
Is this relevant?
1996
1996
—Policy. The first step is to develop a security or privacy policy. The policy precisely defines the requirements that are to be… (More)
Is this relevant?
Review
1995
Review
1995
This paper describes security issues for data warehousing and data mining. It first provides an overview of data warehousing and… (More)
Is this relevant?
1990
1990
Computer security is concerned with the ability of a computer system to enforce a security policy governing the disclosure… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1986
Highly Cited
1986
Because views on relational database systems mathematically define arbitrary sets of stored and derived data, they have been… (More)
  • figure 1
Is this relevant?
1984
1984
The 1982 ilr Force Summer Study on Multilevel Data Management Security recommended several approaches to designing a multilevel… (More)
  • figure 1
  • figure 2
  • figure 4
Is this relevant?