Mostrando 10 resultados de: 10
Subtipo de publicación
Other(10)
Publisher
ACM(1)
IACSIT Press(1)
Inderscience Publishers (IEL)(1)
KIT Karlsruher Institut für Technologie, Fakultät für Informatik(1)
Springer US(1)
Área temáticas
Funcionamiento de bibliotecas y archivos(5)
Programación informática, programas, datos, seguridad(5)
Ciencias de la computación(3)
Derecho privado(3)
Dirección general(2)
Área de conocimiento
Ciencias de la computación(6)
Análisis de redes sociales(4)
Base de datos(2)
Red informática(2)
Red social(2)
Origen
google(10)
Auditoría de la seguridad de la información de la Empresa Transportes Noroccidental
OtherAbstract: El proyecto de titulación denominado "Auditoría de la Seguridad de la Información de la Empresa TranPalabras claves:Autores:Gabriela SuntaxiFuentes:googleA comparative analysis of the social graph model and multiparty access control model for online social networks
OtherAbstract: In recent years, with the growth of the Internet, the number of users of Online Social Networks (OSNPalabras claves:Autores:Gabriela SuntaxiFuentes:googleA survey on SQL injection attacks, detection and prevention techniques-a tertiary study
OtherAbstract: This paper presents a tertiary systematic literature review of SQL injection attacks based on previoPalabras claves:Autores:Gabriela SuntaxiFuentes:googleAccess control models for online social networks
OtherAbstract: In recent years, with the growth of the Internet, the number of users of Online Social Networks (OSNPalabras claves:Autores:Gabriela SuntaxiFuentes:googleMutual authorizations: Semantics and integration issues
OtherAbstract: Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determiPalabras claves:Autores:Gabriela SuntaxiFuentes:googleGuía multimedia para la prevención y detección de vulnerabilidades de inyección SQL durante desarrollo de aplicaciones web (PyDISQL)
OtherAbstract:Palabras claves:Autores:Gabriela SuntaxiFuentes:googleOn Mutual Authorizations: Semantics, Integration Issues, and Performance
OtherAbstract: Protecting information from unauthorized access is important to guarantee data confidentiality. AccePalabras claves:Autores:Gabriela SuntaxiFuentes:googleSecrecy and performance models for query processing on outsourced graph data
OtherAbstract: Database outsourcing is a challenge concerning data secrecy. Even if an adversary, including the serPalabras claves:Autores:Gabriela SuntaxiFuentes:googlePreserving Secrecy in Mobile Social Networks
OtherAbstract: Location-based services are one of the most important services offered by mobile social networks. OfPalabras claves:Autores:Gabriela SuntaxiFuentes:googlePreserving Secrecy in Online Social Networks: Data Outsourcing, Access Control, and Secrecy Schemes
OtherAbstract: In the last years, Online Social Networks (OSNs) like Facebook and Foursquare have become a popularPalabras claves:Autores:Gabriela SuntaxiFuentes:google