Publication | Closed Access
Understanding and Modifying the Relational Schemas Underlying Insecurity.
60
Citations
0
References
2005
Year
Unknown Venue
Database SchemaEngineeringInformation SecurityData PrivacySecurityDatabase SecurityTrustCommunicationArtsData SecuritySecurity Property
No additional data available for this publication yet. Check back later!