Accessing the Data Security Model in Distributed System
نویسندگان
چکیده
منابع مشابه
Accessing the Data Security Model in Distributed System
This research deals with the comparative study of distributed system and client/server computer system, placing a special emphasis is on security system. The researches describe the data security in these systems by describing them; examine their issues, challenges and presenting the adequate solutions. We have selected four type of distributed system and included a report on the basis of autho...
متن کاملAccessing Replicated Data in a Large-Scale Distributed System
Replicating a data object improves the availability of the data, and can improve access latency by locating copies of the object near to their use. When accessing replicated objects across an internetwork, the time to access different replicas is non-uniform. Further, the probability that a particular replica is inaccessible is much higher in an internetwork than in a local-area network (LAN) b...
متن کاملData Security Issues in Distributed Cloud System
Latest technology for better computation and security of data is cloud computing. The key feature of this technology is proving computing services through internet as pay per use to share storage, services, applications, networks without physical acquiring them. So that time taken to organize resources and managing cost reduces a lot. As the cloud is providing pay-per-use pattern on transaction...
متن کاملUsing Fingerprint Recognition in a New Security Model for Accessing Distributed Systems
The security threats to the personal information of Internet users raise the need for improved security measures and authentication mechanisms of username and password so that intruders can be discouraged. Another problem faced by modern-day Internet users is that they are required to maintain a long list of passwords for their web accounts maybe 15-20 accounts. Therefore, this raises the need ...
متن کاملData attribute security and privacy in distributed database system
Now a days there are a need of data attribute security in distributed database while preserving privacy. In the proposed work, we consider problem related in publishing collaborative data for anonymizing vertically and horizontally partitioned data. We consider the attack which may use a subset of the overall data. After in view of entire research work we make the distributed database system in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Applied Information Systems
سال: 2012
ISSN: 2249-0868
DOI: 10.5120/ijais12-450157