نتایج جستجو برای: database security
تعداد نتایج: 438645 فیلتر نتایج به سال:
Advances in networking technologies and the continued growth of the Internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers. As a recent manifestation of this trend, there has been growing interest in outsourcing database services in both the commercial world and the research community. Although the outsourced databa...
The overall aim of the BioSimGrid project (www.biosimgrid.org) is to exploit the Grid infrastructure to enable comparative analysis of the results of biomolecular simulations. In particular this paper discusses the security implementation of the BioSimGrid web portal. To achieve a secured application environment, a dedicated security layer has been built on the layers of SOA (Service Oriented A...
Typical Cloud database services guarantee high availability and scalability, but they rise many concerns about data confidentiality. Combining encryption with SQL operations is a promising approach although it is characterized by many open issues. Existing proposals, which are based on some trusted intermediate server, limit availability and scalability of original cloud database services. We p...
Let A be a k-dimensional matrix of size d 1 :::d k : By a contiguous submatrix B of A we understand the matrix B = fa i 1
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and infer sensitive information from a series of seemingly innocuous data access. In this paper, we proposed a detection system that utilizes both the user’s current query and past query log to determine if the current quer...
Since the terrorist attacks of September 11, 2001, “homeland security” has become the centerpiece of U.S. domestic and foreign policies. The number of terrorists is a tiny fraction of all the people who live in or enter the U.S. However, given the enormous consequences of a repeat of the September 11 attacks, all non-terrorists have been subjected to security measures. The cost of all the secur...
The rapid growth of the networking and information-processing industries has led to the development of distributed database management system prototypes and commercial distributed database management systems. In such a system, the database is stored in several computers which are interconnected by some communication media. The aim of a distributed database management system (DDBMS) is to proces...
Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. Organizations must balance between the requirement for security and the desire for excellent performance. Encryption at the database level, versus application level and file level has proved to be the ideal method to protect sensitive data and deliver...
Database integrity is a central underlying issue in the implementation of database technology. Trust in the correctness of the data that is held by the database system is a prerequisite for using the data in business, research or decision making applications. This paper will begin by discussing the areas that pose challenges in ensuring database security and reliability. It will look at the ben...
Now, we come to offer you the right catalogues of book to open. handbook of database security applications and trends is one of the literary work in this world in suitable to be reading material. That's not only this book gives reference, but also it will show you the amazing benefits of reading a book. Developing your countless minds is needed; moreover you are kind of people with great curios...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید