Abstract
No abstract available.
Cited By
- Etzion O, Rabinovich E and Skarbovsky I Non functional properties of event porcessing Proceedings of the 5th ACM international conference on Distributed event-based system, (365-366)
- Sathya Narayanan G, Aishwarya T, Agrawal A, Patra A, Choudhary A and Pandu Rangan C Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security Proceedings of the 8th International Conference on Cryptology and Network Security, (21-40)
- Said H, Guimaraes M, Maamar Z and Jololian L Database and database application security Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education, (90-93)
- Said H, Guimaraes M, Maamar Z and Jololian L (2009). Database and database application security, ACM SIGCSE Bulletin, 41:3, (90-93), Online publication date: 25-Aug-2009.
- Kamra A, Bertino E and Lebanon G Mechanisms for database intrusion detection and response Proceedings of the 2nd SIGMOD PhD workshop on Innovative database research, (31-36)
- Pan Y Security auditing course development Proceedings of the 8th ACM SIGITE conference on Information technology education, (259-266)
- Guimaraes M, Murray M and Austin R Incorporating database security courseware into a database security class Proceedings of the 4th annual conference on Information security curriculum development, (1-5)
Recommendations
Teaching database security and auditing
SIGCSE '09Hands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in database security and auditing. We are developing a set of hands-on labs to integrate theories of database security into ...
Teaching database security and auditing
SIGCSE '09: Proceedings of the 40th ACM technical symposium on Computer science educationHands-on laboratory experiences are essential critical for students to understand concepts and gain real-world insights in database security and auditing. We are developing a set of hands-on labs to integrate theories of database security into ...