نتایج جستجو برای: database security

تعداد نتایج: 438645  

Journal: :International Journal of Computer Applications 2010

2005
Csilla Farkas Benito Mendoza Alexander Alexandrov

1994
Norbik Bashah Idris W. Alex Gray R. F. Churchhouse

When data is being used in a federated database, the aim is to give a loose coupling of the data in the component databases so that a very dynamic and therefore flexible pattern of data sharing can be established. When security integration is performed this flexibility is curtailed by the resultant security level established at integration time which by default is the least upper bound between ...

2004
Sang H. Son Bhavani Thuraisingham

Database systems for real-time applications must satisfy timing constraints associated with transactions, in addition to maintaining data consistency. In addition to real-time requirements, security is usually required in many applications, because sensitive information must be safeguarded. Multilevel security requirements introduce a new dimension to transaction processing in real-time databas...

2012
Sabrina De Capitani di Vimercati Sara Foresti Sushil Jajodia Pierangela Samarati

1.

2002
Mark Blackburn Robert Busser Aaron Nauman Ramaswamy Chandramouli

This paper extends prior work in model-based verification and describes interface-driven analysis that combines textual requirement modeling to support automated test generation of Java test scripts for executing against a database. It describes concepts of models and test driver mappings using examples for testing security functionality of an Oracle database using Java and standard Structured ...

2014
Mahesh Singh

The growth of the Database domain and the wide Internet has been revolutionized over many years, a large number of people interact through information over the internet. This rapid change and the cost effectiveness of new evolving technologies are providing large opportunities for developing distributed database systems. These large-scale systems are made up of various interacting components, e...

2005
Ravi Sandhu

As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for ...

2007
Astrid Lubinski

Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous , and replicated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید