Page 7 from 607,839 hits

Sort by: Relevancy | Currentness | Title

Filter results

External sources

Searching...

Synonyms were used for: Sicherheit

Search without synonyms: keywords:(Sicherheit)

Used synonyms:

  • safety
  • security
  1.  

    Apparatus: A framework for security analysis in internet of things systems

    Mavropoulos, Orestis / Mouratidis, Haralambos / Fish, Andrew et al. | Elsevier | 2018
    Keywords: IoT Security, Security requirements, Smart cities security
  2.  

    Schema Based XML Security: RBAC Approach

    Zhang, X. / Park, J. / Sandhu, R. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  3.  

    An Administrative Model for Role Graphs

    Wang, H. / Osborn, S. L. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  4.  

    Privacy under Conditions of Concurrent Interaction with Multiple Parties

    Olivier, M. S. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  5.  

    Delivering Services with Integrity Guarantees in Survivable Database Systems

    Zhang, J. / Liu, P. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  6.  

    Survival of an Intrusion Tolerance Database System

    Su Thawda Win | BASE | 2019
    Keywords: Computer Security, Security
  7.  

    Load Shedding in Data Stream Management Systems Using Application Semantics

    Adaikkalavan, R. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  8.  

    EXPLORE: A Novel Decision Tree Classification Algorithm

    Islam, M.Z. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  9.  

    Whither BNCOD and the UK Database Community

    Jeffery, K.G. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  10.  

    A Data Integration Methodology and Architecture with Quality Assessment Functionality

    Wang, J. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  11.  

    Flexible Range Semantic Annotations Based on RDFa

    Navarro-Galindo, J.L. / Jimenez, J.S. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  12.  

    Enabling Decision Tree Classification in Database Systems through Pre-computation

    Rehman, N.U. / Scholl, M.H. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  13.  

    Defining Spatio-Temporal Granularities for Raster Data

    Pozzani, G. / Zimanyi, E. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  14.  

    A Quality Framework for Data Integration

    Wang, J. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  15.  

    Access Control Using Active Rules

    Adaikkalavan, R. / Chakravarthy, S. | British Library Conference Proceedings | 2012
    Keywords: Database security, Data security, Security data
  16.  

    Conclusions and perspectives

    Hedenskog, J. | British Library Conference Proceedings | 2005
    Keywords: National security, Russia's security policy
  17.  

    Safety and Liveness for an RBAC/MAC Security Model

    Phillips, C. / Demurjian, S. / Ting, T. C. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  18.  

    A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities

    Bertino, E. / Ferrari, E. / Squicciarini, A. C. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  19.  

    Correlated Data Inference

    Farkas, C. / Stoica, A. G. | British Library Conference Proceedings
    Keywords: Database security, Applications security
  20.  

    Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases

    Ragothaman, P. / Panda, B. | British Library Conference Proceedings
    Keywords: Database security, Applications security

Number of results: 10 | 20 | 50