Redirigiendo al acceso original de articulo en 16 segundos...
ARTÍCULO
TITULO

Secure Databases - Integrating Security and Real-Time Requirements Using Covert Channel Capacity

Son    
S H    
Mukkamala    
R    
David    
R    

Resumen

No disponible

 Artículos similares

       
 
Abdel Rahman Alzoubaidi     Pág. pp. 37 - 42
Cloud Computing is an environment where computing resources, such as processing power, storage, network, application, and other IT services, are provided to users as computing utility. This paper presents the university distributed databases consolidatio... ver más

 
Syed Hamid Hasan, Mohamed Salim Trigui, Anser Ghazzaal Ali Alquraishee     Pág. 1424 - 1429
The process of protecting the accessibility,  reliability, and secrecy of information is called Information security. We see a great increase in accessing of computer databases for stored information. Increasing number of companies are storing indiv... ver más

 
Brodsky, A; Farkas, C; Jajodia, S     Pág. 900 - 919

 
Ray, I; Mancini, L B; Jajodia, S; Bertino, E     Pág. 880 - 899

 
Atluri, V; Jajodia, S; Bertino, E     Pág. 697 - 730