Database security

Results: 2123



#Item
1SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

SoK: Cryptographically Protected Database Search Benjamin Fuller∗ , Mayank Varia† , Arkady Yerukhimovich‡ , Emily Shen‡ , Ariel Hamlin‡ , Vijay Gadepally‡ , Richard Shay‡ , John Darby Mitchell‡ , and Robe

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:55
2Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2  Abstract— We are building the first comprehensive database

Poster - Using Twitter to Identify Privacy Information Esha Sharma1 and Jessica Staddon 2 Abstract— We are building the first comprehensive database

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 01:15:34
3Morpheus Helps Meet Compliance & Security Demands provision with Morpheus automatically creates system, database, and application logs that allow you to analyze and troubleshoot in near real-time. Likewise, all the syste

Morpheus Helps Meet Compliance & Security Demands provision with Morpheus automatically creates system, database, and application logs that allow you to analyze and troubleshoot in near real-time. Likewise, all the syste

Add to Reading List

Source URL: assets.morpheusdata.com

Language: English - Date: 2016-02-13 13:58:58
    41.1  Advanced Security Consulting Service Description Your eTapestry database provides you with the opportunity to restrict certain areas of the database for access.

    1.1 Advanced Security Consulting Service Description Your eTapestry database provides you with the opportunity to restrict certain areas of the database for access.

    Add to Reading List

    Source URL: app.etapestry.com

    Language: English - Date: 2014-08-14 11:37:45
      5The Gridiron Risk Model Aptible Gridiron uses a graph database to model information security risks, events or situations that have the potential to cause adverse impacts.

      The Gridiron Risk Model Aptible Gridiron uses a graph database to model information security risks, events or situations that have the potential to cause adverse impacts.

      Add to Reading List

      Source URL: www.aptible.com

      - Date: 2018-03-21 14:07:12
        6Income distribution patterns from a complete social security database

        Income distribution patterns from a complete social security database

        Add to Reading List

        Source URL: adatbank.transindex.ro

        - Date: 2015-12-02 05:14:54
          7The STIG and Database Security

          The STIG and Database Security

          Add to Reading List

          Source URL: www.nebraskacert.org

          - Date: 2016-01-21 01:41:50
            8What is Helios? Linear Scalability Helios is a big database management system (BDBMS). It provides the scale of NoSQL combined with data management, security, and semantics.

            What is Helios? Linear Scalability Helios is a big database management system (BDBMS). It provides the scale of NoSQL combined with data management, security, and semantics.

            Add to Reading List

            Source URL: nosql2015.dataversity.net

            - Date: 2015-07-30 13:13:30
              9THE EVOLUTION OF DOMESTIC INFORMATION DISPLAY SYSTEMS: TOWARD A GOVERNMENT PUBLIC INFORMATION NETWORK Edward K. Zimmerman National Telecommunications &

              THE EVOLUTION OF DOMESTIC INFORMATION DISPLAY SYSTEMS: TOWARD A GOVERNMENT PUBLIC INFORMATION NETWORK Edward K. Zimmerman National Telecommunications &

              Add to Reading List

              Source URL: mapcontext.com

              Language: English - Date: 2008-08-29 23:31:17
              10An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

              An Electronic-signature Based Circular Resolution Database System Thomas Zefferer and Thomas Knall Institute for Applied Information Processing and Communications (IAIK)

              Add to Reading List

              Source URL: www.a-sit.at

              Language: English - Date: 2010-04-14 10:56:00