Publication | Closed Access
Protecting deductive databases from unauthorized retrieval and update requests
14
Citations
15
References
2002
Year
EngineeringDeductive DatabaseInformation SecurityData PrivacyDatabase SecurityComputer ScienceDeductive DatabasesFormal VerificationDatabase AccessData ManagementData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1