Login / Signup
An enterprise policy-based security protocol for protecting relational database network objects.
Wassim Itani
Ayman I. Kayssi
Ali Chehab
Published in:
IWCMC (2006)
Keyphrases
</>
relational databases
security protocols
peer to peer
databases
network traffic
database
cryptographic algorithms
wireless sensor networks
knowledge management
database objects
functional dependencies
security measures
security services
authentication protocol
computer networks
cost effective
real time