Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Database Security
biblio
Word and Phrase Proximity Searchable Encryption Protocols for Cloud Based Relational Databases
Submitted by grigby1 on Wed, 03/29/2017 - 12:39pm
composability
Database Security
Metrics
pubcrawl
Resiliency
searchable encryption
white box
white box cryptography
Word and Phrase encrypted search
biblio
Detection of Malicious Transaction in Database Using Log Mining Approach
Submitted by BrandonB on Wed, 05/06/2015 - 2:06pm
Intrusion Detection
Training
SQL
security of data
relational databases
query structures
query database
malicious transaction detection
log mining approach
anomalous database transactions
domain dependency rules
Database systems
Database Security
data sequence rules
Data mining
Computers
automatic discovery
biblio
Security of sharded NoSQL databases: A comparative analysis
Submitted by BrandonB on Fri, 05/01/2015 - 8:30am
encryption
SQL
Sharding
sharded NoSQL databases
Servers
security of data
security features
NoSQL sharding mechanisms
NoSQL
Access Control
Distributed databases
Database Security
Data and Applications Security
Comparative Analysis
BASE
authentication
assessment criterion
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
« first
‹ previous
1
2