Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic H. - Information Systems
Topic H.2 - DATABASE MANAGEMENT
Topic H.2.0 - General

A. Baraani-Dastjerdi, J. Pieprzyk, R. Safavi-Naini, J.R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
/jucs_3_6/using_cryptographic_functions_for
page 730 - 753
Vol.3 / Issue 6
I. Caballero, A. Caro, C. Calero, M. Piattini:
IQM3: Information Quality Management Maturity Model
/jucs_14_22/iqm3_information_quality_management
page 3658 - 3685
Vol.14 / Issue 22
D. Cristofor, L. Cristofor, D. A. Simovici:
Galois Connections and Data Mining
/jucs_6_1/galois_connections_and_data
page 60 - 73
Vol.6 / Issue 1
M. Masud, M.S. Hossain, A. Alamri, A. Almogren, M. Zakariah:
Synchronizing Data through Update Queries in Interoperable E-Health and Technology Enhanced Learning Data Sharing Systems
/jucs_21_11/synchronizing_data_through_update
page 1439 - 1453
Vol.21 / Issue 11