Page 6 from 607,837 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources

Searching...

Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security
  1.  

    Persistent versus Dynamic Role Membership

    Bacon, J. / Chadwick, D. W. / Otenko, O. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  2.  

    Systematic Development of a Family of Fair Exchange Protocols

    Ezhilchelvan, P. D. / Shrivastava, S. K. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  3.  

    Secure Authorisation for Web Services

    Indrakanti, S. / Varadharajan, V. / Hitchens, M. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  4.  

    Administration Rights in the SDSD-System

    Biskup, J. / Leineweber, T. / Parthe, J. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  5.  

    Adapting Query Optimization Techniques for Efficient Alert Correlation

    Ning, P. / Xu, D. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  6.  

    Security-related behavior in using information systems in the workplace: A review and synthesis

    Guo, Ken H. | Elsevier | 2012
    Keywords: Information security, Security-related behavior, Security assurance behavior, Security risk-taking behavior, Security damaging behavior, Security violation
  7.  

    RBAC Policy Implementation for SQL Databases

    Barker, S. / Douglas, P. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  8.  

    High-speed Access Control for XML Documents

    Yoon, J. P. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  9.  

    Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model

    Hacigumus, H. / Iyer, B. / Mehrotra, S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  10.  

    Security Risk Assessment Methodology for the petroleum and petrochemical industries

    Moore, David A. | Elsevier | 2013
    Keywords: Security risk management, Security risk assessment, Chemical security, Energy security
  11.  

    A study on cloud security issues

    Prathyusha, Damai Jessica / Naseera, Shaik | IOS Press | 2017
    Keywords: Cloud security, security threats, security precautions
  12.  

    The evolution of security industry regulation in the European Union

    Button, Mark / Stiernstedt, Peter | Taylor & Francis Verlag | 2017
    Keywords: Private security, security industry, security directive
  13.  

    FlexFlow: A Flexible Flow Control Policy Specification Framework

    Chen, S. / Wijesekera, D. / Jajodia, S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  14.  

    Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses

    Lin, T. Y. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  15.  

    ECPV: Efficient Certificate Path Validation in Public-key Infrastructure

    Halappanavar, M. / Mukkamala, R. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  16.  

    Modifying LDAP to Support PKI

    Chadwick, D. W. / Ball, E. / Sahalayev, M. V. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  17.  

    Anti-Tamper Databases: Querying Encrypted Databases

    Ozsoyoglu, G. / Singer, D. A. / Chung, S. S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  18.  

    Remote Computer Fingerprinting for Cyber Crime Investigations

    Novotny, J. / Schulte, D. / Manes, G. et al. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  19.  

    Taking stock of networks across the security field: a review, typology and research agenda

    Whelan, Chad / Dupont, Benoît | Taylor & Francis Verlag | 2017
    Keywords: Security networks, security governance, security
  20.  

    Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption

    Kim, M. / Kim, J. / Kim, K. | British Library Conference Proceedings | 2002
    Keywords: information security, communication security

Number of results: 10 | 20 | 50