End-to-End Database Software Security
datacite.relatedItem.firstPage | 163 | |
datacite.relatedItem.issue | 2 | |
datacite.relatedItem.relatedIdentifierType | ISSN | |
datacite.relatedItem.relatedItemIdentifier | 2674-113X | |
datacite.relatedItem.relationType | IsPublishedIn | |
datacite.relatedItem.title | Software | |
datacite.relatedItem.volume | 2 | |
dc.contributor.author | Denis Ulybyshev | |
dc.contributor.author | Michael Rogers | |
dc.contributor.author | Vadim Kholodilo | |
dc.contributor.author | Bradley Northern | |
dc.date.accessioned | 2024-08-14T11:13:59Z | |
dc.date.available | 2024-08-14T11:13:59Z | |
dc.date.issued | 2023 | |
dc.identifier.doi | https://doi.org/10.3390/software2020007 | |
dc.identifier.other | jz000087-0009 | |
dc.identifier.uri | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3678 | |
dc.publisher | MDPI AG | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.subject.ddc | 004 | |
dc.title | End-to-End Database Software Security | |
dc.type | Article | |
dcat.distribution.pdf | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3679 | |
dcat.distribution.supplierxml | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/3680 | |
dspace.entity.type | Dataset | |
relation.isDistributionOfDataset | 993da9f7-8418-4c48-85fa-2a1905855b15 | |
relation.isDistributionOfDataset | ce4619ce-34e7-422b-b72f-4f19dd02f1c6 | |
relation.isDistributionOfDataset | 6b441796-c7be-4f00-afde-7ffcd480be75 | |
relation.isDistributionOfDataset.latestForDiscovery | 993da9f7-8418-4c48-85fa-2a1905855b15 | |
wdm.archivematicaaipuuid.original | cebf5019-3348-4a28-8fb6-0f729c55a790 |