Login / Signup
The application of cryptography for data base security.
Ehud Gudes
Harvey S. Koch
Fred A. Stahl
Published in:
AFIPS National Computer Conference (1976)
Keyphrases
</>
database
network security
information security
network connection
data sets
databases
case study
encryption algorithms
data base management
application level
key technologies
intrusion detection
data management
query language
database systems
metadata
information systems