نتایج جستجو برای: database security
تعداد نتایج: 438645 فیلتر نتایج به سال:
When data is being used in a federated database, the aim is to give a loose coupling of the data in the component databases so that a very dynamic and therefore flexible pattern of data sharing can be established. When security integration is performed this flexibility is curtailed by the resultant security level established at integration time which by default is the least upper bound between ...
Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time databas...
1.
This paper extends prior work in model-based verification and describes interface-driven analysis that combines textual requirement modeling to support automated test generation of Java test scripts for executing against a database. It describes concepts of models and test driver mappings using examples for testing security functionality of an Oracle database using Java and standard Structured ...
The growth of the Database domain and the wide Internet has been revolutionized over many years, a large number of people interact through information over the internet. This rapid change and the cost effectiveness of new evolving technologies are providing large opportunities for developing distributed database systems. These large-scale systems are made up of various interacting components, e...
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for ...
Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous , and replicated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید