Amanote Research

Amanote Research

    RegisterSign In

Methods to Secure Databases Against Vulnerabilities

doi 10.21236/ad1009288
Full Text
Open PDF
Abstract

Available in full text

Date

December 1, 2015

Authors
Jonathan P. Sloan
Publisher

Defense Technical Information Center


Related search

Constraints Inference Channels and Secure Databases

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2000English

Novel Micro-Aggregation Techniques for Secure Statistical Databases

English

Using Information Flow Methods to Secure Cyber-Physical Systems

IFIP Advances in Information and Communication Technology
Computer NetworksInformation SystemsManagementCommunications
2015English

Intelligent Methods in Virtual Databases

2001English

Dynamic Distributed Secure Storage Against Ransomware

IEEE Transactions on Computational Social Systems
ModelingSimulationSocial SciencesHuman-Computer Interaction
2019English

Secure Computation Against Adaptive Auxiliary Information

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Applying Statistical and Analytical Methods to U.S. Department of Veterans Affairs Databases

Biostatistics and Epidemiology
EpidemiologyHealth Informatics
2020English

Generation of Test Databases Using Sampling Methods

2013English

Methods and Treatments Used to Secure Natural Regeneration in British Columbia

Forestry Chronicle
Forestry
1970English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy