Database Security Model in the Academic Information System
暂无分享,去创建一个
[1] Ramadian Agus Triyono,et al. Pembangunan Sistem Informasi Kartu Rencana Studi (Krs) Dan Kartu Hasil Studi (KHS) On Line Pada Sekolah Tinggi Ilmu Tarbiyah Nahdlatul Ulama (STIT NU) Pacitan , 2012 .
[2] Yuri Yudhaswana Joefrie,et al. DESAIN BASIS DATA SISTEM INFORMASI AKADEMIK DI FAKULTAS TEKNIK UNIVERSITAS TADULAKO , 2013 .
[3] Stéphane Coulondre,et al. A relational database integrity framework for access control policies , 2010, Journal of Intelligent Information Systems.
[4] Hadi M.Kom Ahmaddul,et al. Rancang Bangun Sistem Pengamanan Dokumen Pada Sistem Informasi Akademik Menggunakan Digital Signature dengan Algoritma Kurva Eliptik , 2012 .
[5] Dan Liu,et al. Study on methods for data confidentiality and data integrity in relational database , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[6] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[7] R. Rizal Isnanto,et al. ANALISIS KEAMANAN SISTEM INFORMASI AKADEMIK FAKULTAS TEKNIK UNDIP VERSI0.4 TAHUN 2005 , 2011 .
[8] John J. Marciniak,et al. Encyclopedia of Software Engineering , 1994, Encyclopedia of Software Engineering.
[9] Fedi Rahadi Noviandi. PENNGEMBANGAN SISTEM INFORMASI AKADEMIK FAKULTAS TEKNIK UNIVERSITAS TANJUNGPURA , 2013 .
[10] Min-Shiang Hwang,et al. Privacy Protection Data Access Control , 2013, Int. J. Netw. Secur..
[11] Yuval Elovici,et al. Database encryption: an overview of contemporary challenges and design considerations , 2010, SGMD.
[12] Nhan Le Thanh,et al. Enforcing Access Control to Web Databases , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[13] Ibrahim Kamel,et al. Toward protecting the integrity of relational databases , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).
[14] Ayman Mohamed Mostafa,et al. Interactive multi-layer policies for securing relational databases , 2012, International Conference on Information Society (i-Society 2012).
[15] Syed Afaq Husain,et al. A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations , 2013, TheScientificWorldJournal.