نتایج جستجو برای: database security
تعداد نتایج: 438645 فیلتر نتایج به سال:
In this paper, we first define a logical theory representing an XML database supporting XPath as query language and XUpdate as modification language. We then extend our theory with predicates allowing us to specify the security policy protecting the database. The security policy includes rules addressing the read and write privileges. We propose axioms to derive the database view each user is p...
Databases hold a critical concentration of sensitive information and become available on the internet to facilitate access, and as a result, databases are vulnerable and become the target of hackers. Today the security of database system become one of the most urgent tasks in database research, so to protect database system from attacking and compromised through authorized users who abuse or mi...
There are several proposed approaches for multilevel secure (MLS) database systems which protect classi ed information. The SINTRA database system, which is currently being prototyped at the Naval Research Laboratory, is a multilevel trusted database system based on a replicated data approach. This approach uses physical separation of classi ed data as a protection measure. Each database contai...
In this project, a real time finger vein system for a security in ATM machine is proposed. In ATM user or bank sector, there is no enough security for users, so provide more security to user finger vein method is used. The fingervein is a biometric authentication for personal identification in terms of its own security. Everyone has unique finger vein, and it cannot be stolen by anyone because ...
Enterprise services are commonly deployed on Internet facing applications and Mobile Apps. There is a need to have an Infrastructure and Application Framework to protect the information flow web layer and mobile apps. Trust management is being recognized in the industry along with Federated Single Sign on to cater the need of data protection at rest and in transits. Web layer need to be very li...
There has been considerable interest in querying encrypted data, allowing a “secure database server” model where the server does not know data values. This paper shows how results from cryptography prove the impossibility of developing a server that meets cryptographicstyle definitions of security and is still efficient enough to be practical. The weaker definitions of security supported by pre...
In this thesis we present the work done in the construction of new Database model eDB under the Database as a service (DaaS) framework. The main challenge in the DaaS model is to provide data security from service provider along with efficient computation of queries on the cloud database. To handle both the challenges (data security and efficient computation), we use multiple partial homomorphi...
Database security mainly deal with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve Privilege Abuse, Weak Authentication, Weak Audit Trails and Operating System Vulnerabilities. To make the security least compromised; all users are required to follow the rules set up by Database Administrator. These rules are said to be Mandatory ...
This chapter investigates the affect of knowledge discovery from databases on the security of databases. First, it examines the current concern with database systems for security from knowl edge discovery. Second, this chapter discusses some of the potential security risks associated with knowledge discovery. Third, some potential structure for the development of controls for such systems is e...
SELINKS allows cross-tier security enforcement between the application tier and the database tier by compiling policy functions and database queries into user-defined functions (UDFs) and SQL queries. Unfortunately, this kind of enforcement is restricted to the policies written within SELINKS framework; and therefore, it does not take into account the existing policies in the database. Furtherm...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید