Design and implementation of multi-layer policies for database security
نویسندگان
چکیده
منابع مشابه
Design and implementation of multi-layer policies for database security
The security of database depends on a set of systems, roles, procedures, and processes that protect the entire database from unintended activities. Unintended activities can be categorized as authenticated misuse, malicious attacks or inadvertent mistakes made by authorized users. If any intruder succeeds in attacking the system network, the database security will be the last line of defense in...
متن کاملDesign and Implementation of a Comprehensive Database of the Written Heritage of Science and Technology
Purpose: This study aims to design and implement a comprehensive database of the written heritage of science and technology in the Regional Information Center for Science and Technology (RICeST) and determine the metadata elements required to describe the manuscripts. Method: This study was carried out by the content analysis method to identify the metadata elements needed to describe the coll...
متن کاملdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولDesign and Implementation of Database Intrusion Detection System for Security in Database
In this paper, we propose database intrusion detection mechanism to enhance the security of DBMS. In a typical database environment, it is possible to define the profile of transactions that each user is allowed to execute. In our approach, we use the transactions profile and overall system architecture is divided into two parts, learning phase and intrusion detection phase. The learning phase ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Sciences Letters
سال: 2013
ISSN: 2090-9551,2090-956X
DOI: 10.12785/isl/020303