Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
[책][B] Database systems: design, implementation and management
C Coronel, S Morris - 2019 - thuvienso.hoasen.edu.vn
Database Systems: Design, Implementation, & Management, 13th ed. Page 1 DATABASE
SYSTEMS Carlos Coronel | Steven Morris Design, Implementation, and Management 13e …
SYSTEMS Carlos Coronel | Steven Morris Design, Implementation, and Management 13e …
Continuous auditing of database applications: An embedded audit module approach
SM Groomer, US Murthy - Continuous Auditing: Theory and …, 2018 - emerald.com
This paper demonstrates an approach to address the unique control and security concerns
in database environments by using audit modules embedded into application programs …
in database environments by using audit modules embedded into application programs …
[인용][C] Testing Computer Software
C Kaner - 1999 - books.google.com
Dies ist die 2. Auflage eines herausragenden und äußerst erfolgreichen Softwaretitels, der
auch von Amazon besonders empfohlen wird. Früher herausgegeben von VNR Computer …
auch von Amazon besonders empfohlen wird. Früher herausgegeben von VNR Computer …
Database encryption: an overview of contemporary challenges and design considerations
This article describes the major challenges and design considerations pertaining to
database encryption. The article first presents an attack model and the main relevant …
database encryption. The article first presents an attack model and the main relevant …
[책][B] Security patterns in practice: designing secure architectures using software patterns
E Fernandez-Buglioni - 2013 - books.google.com
Learn to combine security theory and code to produce secure systems Security is clearly a
crucial issue to consider during the design and implementation of any distributed software …
crucial issue to consider during the design and implementation of any distributed software …
[책][B] Essentials of systems analysis and design
JS Valacich, JF George, JA Hoffer - 2015 - thuvienso.hoasen.edu.vn
This briefer version of the authors' highly successful Modern System Analysis and Design is
a clear presentation of information, organised around the systems development life cycle …
a clear presentation of information, organised around the systems development life cycle …
[PDF][PDF] Access control for collaborative environments
HH Shen, P Dewan - Proceedings of the 1992 ACM conference on …, 1992 - dl.acm.org
Access control is an indispensable part of any information sharing system. Collaborative
environments introduce new requirements for accesscontrol, which cannot be met by using …
environments introduce new requirements for accesscontrol, which cannot be met by using …
A model of authorization for next-generation database systems
The conventional models of authorization have been designed for database systems
supporting the hierarchical, network, and relational models of data. However, these models …
supporting the hierarchical, network, and relational models of data. However, these models …
Enhancing access to microdata while protecting confidentiality: Prospects for the future
GT Duncan, RW Pearson - Statistical Science, 1991 - projecteuclid.org
This article presents a scenario for the future of research access to federally collected
microdata. Many researchers find access to government databases increasingly desirable …
microdata. Many researchers find access to government databases increasingly desirable …