Redirigiendo al acceso original de articulo en 19 segundos...
ARTÍCULO
TITULO

Secure Databases - Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures

Brodsky    
A    
Farkas    
C    
Jajodia    
S    

Resumen

No disponible

 Artículos similares

       
 
Abdel Rahman Alzoubaidi     Pág. pp. 37 - 42
Cloud Computing is an environment where computing resources, such as processing power, storage, network, application, and other IT services, are provided to users as computing utility. This paper presents the university distributed databases consolidatio... ver más

 
Syed Hamid Hasan, Mohamed Salim Trigui, Anser Ghazzaal Ali Alquraishee     Pág. 1424 - 1429
The process of protecting the accessibility,  reliability, and secrecy of information is called Information security. We see a great increase in accessing of computer databases for stored information. Increasing number of companies are storing indiv... ver más

 
Son, S H; Mukkamala, R; David, R     Pág. 865 - 879

 
Ray, I; Mancini, L B; Jajodia, S; Bertino, E     Pág. 880 - 899

 
Atluri, V; Jajodia, S; Bertino, E     Pág. 697 - 730