Page 1 from 49,969 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources

Searching...

Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security
  1.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Keywords: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  2.  

    Securing Management and Managing Security

    Jacobs, Stuart | Wiley | 2011
    Keywords: operational security, security management, security mechanisms, security policies, security systems design
  3.  

    Securing the Clouds

    Methodologies and Practices
    Liu, Simon | Wiley | 2016
    Keywords: cloud security, security concerns, cloud security management, security audit, security policy
  4.  

    FlexFlow: A Flexible Flow Control Policy Specification Framework

    Chen, S. / Wijesekera, D. / Jajodia, S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  5.  

    Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses

    Lin, T. Y. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  6.  

    ECPV: Efficient Certificate Path Validation in Public-key Infrastructure

    Halappanavar, M. / Mukkamala, R. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  7.  

    Modifying LDAP to Support PKI

    Chadwick, D. W. / Ball, E. / Sahalayev, M. V. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  8.  

    Anti-Tamper Databases: Querying Encrypted Databases

    Ozsoyoglu, G. / Singer, D. A. / Chung, S. S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  9.  

    Remote Computer Fingerprinting for Cyber Crime Investigations

    Novotny, J. / Schulte, D. / Manes, G. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  10.  

    Schema Based XML Security: RBAC Approach

    Zhang, X. / Park, J. / Sandhu, R. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  11.  

    An Administrative Model for Role Graphs

    Wang, H. / Osborn, S. L. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  12.  

    Privacy under Conditions of Concurrent Interaction with Multiple Parties

    Olivier, M. S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  13.  

    Delivering Services with Integrity Guarantees in Survivable Database Systems

    Zhang, J. / Liu, P. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  14.  

    Safety and Liveness for an RBAC/MAC Security Model

    Phillips, C. / Demurjian, S. / Ting, T. C. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  15.  

    A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities

    Bertino, E. / Ferrari, E. / Squicciarini, A. C. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  16.  

    Correlated Data Inference

    Farkas, C. / Stoica, A. G. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  17.  

    Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases

    Ragothaman, P. / Panda, B. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  18.  

    A Quality Framework for Data Integration

    Wang, J. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  19.  

    Access Control Using Active Rules

    Adaikkalavan, R. / Chakravarthy, S. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  20.  

    Digital Forensics: Operational, Legal, and Research Issues

    Pollitt, M. / Caloyannides, M. / Novotny, J. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security

Number of results: 10 | 20 | 50