Amanote Research

Amanote Research

    RegisterSign In

WorkFlow Analyzed for Security and Privacy in Using Databases

IFIP International Federation for Information Processing
doi 10.1007/0-306-47008-x_24
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2002

Authors
Wouter TeepeReind van de RietMartin Olivier
Publisher

Springer US


Related search

Security and Privacy: Why Privacy Matters

Science and Engineering Ethics
Legal AspectsHealth PolicyHealthInnovationEthicsManagement of TechnologyIssues
2013English

Lightweight Cryptography for Security and Privacy

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Hierarchical Model for Preserving Privacy in Vertically Partitioned Distributed Databases

International Journal of Computer Applications
2013English

Security and Privacy in Social Networks

Concurrency Computation Practice and Experience
Computer NetworksCommunicationsComputer Science ApplicationsComputational TheoryMathematicsTheoretical Computer ScienceSoftware
2017English

Privacy-Preserving Data Publishing for Horizontally Partitioned Databases

2008English

Security and Privacy in Cloud Computing

2013English

Privacy and Security in E-Learning

Future Directions in Distance Learning and Communication Technologies
2007English

Privacy and Security in E-Learning

English

Security and Privacy in RFID Applications

2009English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy