Page 1 from 42,926 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources

Searching...

Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security
  1.  

    Information security management in SOCs and SICs

    Miloslavskaya, Natalia | IOS Press | 2018
    Keywords: Information security, information security incident, information security management, Security Operations Center, Security Intelligence Center
  2.  

    Securing Management and Managing Security

    Jacobs, Stuart | Wiley | 2011
    Keywords: operational security, security management, security mechanisms, security policies, security systems design
  3.  

    Securing the Clouds

    Methodologies and Practices
    Liu, Simon | Wiley | 2016
    Keywords: cloud security, security concerns, cloud security management, security audit, security policy
  4.  

    Data and Applications Security: Past, Present and the Future

    Thuraisingham, B. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  5.  

    Persistent versus Dynamic Role Membership

    Bacon, J. / Chadwick, D. W. / Otenko, O. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  6.  

    Systematic Development of a Family of Fair Exchange Protocols

    Ezhilchelvan, P. D. / Shrivastava, S. K. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  7.  

    Secure Authorisation for Web Services

    Indrakanti, S. / Varadharajan, V. / Hitchens, M. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  8.  

    Administration Rights in the SDSD-System

    Biskup, J. / Leineweber, T. / Parthe, J. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  9.  

    Adapting Query Optimization Techniques for Efficient Alert Correlation

    Ning, P. / Xu, D. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  10.  

    Security questions education: exploring gamified features and functionalities

    Micallef, Nicholas / Arachchilage, Nalin Asanka Gamagedara | Emerald Group Publishing | 2018
    Keywords: Usable security, Cyber security education, Security questions
  11.  

    RBAC Policy Implementation for SQL Databases

    Barker, S. / Douglas, P. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  12.  

    High-speed Access Control for XML Documents

    Yoon, J. P. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  13.  

    Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model

    Hacigumus, H. / Iyer, B. / Mehrotra, S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  14.  

    FlexFlow: A Flexible Flow Control Policy Specification Framework

    Chen, S. / Wijesekera, D. / Jajodia, S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  15.  

    Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses

    Lin, T. Y. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  16.  

    ECPV: Efficient Certificate Path Validation in Public-key Infrastructure

    Halappanavar, M. / Mukkamala, R. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  17.  

    Modifying LDAP to Support PKI

    Chadwick, D. W. / Ball, E. / Sahalayev, M. V. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  18.  

    Anti-Tamper Databases: Querying Encrypted Databases

    Ozsoyoglu, G. / Singer, D. A. / Chung, S. S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  19.  

    Remote Computer Fingerprinting for Cyber Crime Investigations

    Novotny, J. / Schulte, D. / Manes, G. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  20.  

    A study on cloud security issues

    Prathyusha, Damai Jessica / Naseera, Shaik | IOS Press | 2017
    Keywords: Cloud security, security threats, security precautions

Number of results: 10 | 20 | 50