نتایج جستجو برای: database security
تعداد نتایج: 438645 فیلتر نتایج به سال:
Personal information that is collected online can be misused and abused. Therefore, data security techniques that restrict the usage of data only to purposes specified by data providers are needed. The LDHD model, a well-known database security model, expresses the purpose of data provision in the unit of cell in order to have a detailed control over privacy preservation. However, since this mo...
Database is an organized collection of data, many user wants to store their personal and confidential data’s in such database. Unauthorized persons may try to get the data’s from database and misuse them without the owner’s knowledge. To overcome such problem the advanced control mechanism, known as Database security was introduced. Encryption algorithm is one of the way to give protection to t...
In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper we presented a secure concurrency control protocol (SCCP) based on the timestamp ordering, which provides concurrency control and maintains security...
Each year the reported number of security vulnerabilities increases as does the sophistication of attacks to exploit these vulnerabilities. Most security vulnerabilities are the result of insecure coding practices. There is a critical need to increase the security education of computer science students, particularly in software security. We are designing course modules, to be used at the underg...
Relatively few databases are accessible over the Internet. With today's technology one would like to encapsulate a database and make it available over the Internet. A client using such databases would browse an old census database, look-up for references in an object-oriented database system, access descriptions and pictures over the Internet, or combine di erent information using NCSA Mosaic, ...
As organizations increase their dependence on database systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. A truly comprehensive approach for data protection must include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics. The database security comm...
Unlike previous approaches to developing a trusted database system, the replicated architecture approach provides access control at a high level of assurance through replication of data and operations. We present a model of the SINTRA replicated architecture trusted database system which shows how the logical (users') view of the system and its security policy is translated into the physical st...
1.1 Related Works .................................................................................................................... 2 1.2 Introduction ....................................................................................................................... 3 1.3 About Information Systems and Security and Applicable Areas ......................................... 4 1.3.1 The Bas...
Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and multilevel access controls (MAC), protection and integrity maintenance. While determining which distributed database replica will be more secure for a particular ...
In this paper, we propose a new multiversion locking protocol for real-time database systems for providing multilevel security. Real-Time DBMS(RTDBMS) is a system that processes transactions with explict timing constraints. Thus, it must satisfy not only logical data consistency but also timing constraints associated with transactions. There are increasing needs for security in many application...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید