نتایج جستجو برای: database security

تعداد نتایج: 438645  

2011
Udai Pratap Rao Dhiren R. Patel

The protection of the data over the database is some how mandatory for the organization, so there is a demand of the security mechanism to protect the database. Even the existing security measures at the database application level are not able to protect the database completely from some malicious actions and reason may be especially because of insider attack. The main objective here, is to des...

1998
Quazi N. Ahmed Susan V. Vrbsky

Many real-time database systems, such as military institutions and government agencies, are contained in environments that exhibit restricted access of information, where mandatory access control for security is required. Hence, in addition to timing constraints, real-time database systems have security constraints. Conventional multi-level secure database models are inadequate for time-critica...

2004
Bhavani Thuraisingham

In a multilevel secure distributed database management system, users cleared at different security levels access and share a distributed database consisting of data at different sensitivity levels. An approach to assigning sensitivity levels, also called security levels, to data is one which utilizes constraints or classification rules. Security constraints provide an effective classification p...

2016
Mubina Malik Trisha Patel

In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the dat...

Journal: :the modares journal of electrical engineering 2016
mustafa gholami gvrvg gharehpetian mohammad mohammadi

due to the high penetration of wind farms in the networks, they can have a significant role in the control of power systems. in this paper, wind farms (wfs) are used to improve the static security margins of the power system. generation rescheduling is one of the remedies to improve the static security margins of the power system. in this paper, the generation rescheduling is presented based on...

2015
Abhishek Mukherjee

In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...

Journal: :iranian red crescent medical journal 0
ramin mehrdad center for research on occupational diseases, tehran university of medical sciences, tehran, ir iran shahdokht seifmanesh center for research on occupational diseases, tehran university of medical sciences, tehran, ir iran farzaneh chavoshi center for research on occupational diseases, tehran university of medical sciences, tehran, ir iran omid aminian center for research on occupational diseases, tehran university of medical sciences, tehran, ir iran nazanin izadi center for research on occupational diseases, tehran university of medical sciences, tehran, ir iran; center for research on occupational diseases, tehran university of medical sciences, tehran, ir iran. tell: +98-2166405588

conclusion: due to the high rate of accidents in metal and construction industries, engineering controls, the use of appropriate protective equipment and safety worker training seems necessary. results: the occupational accidents rate was 253 in 100,000 workers in 2008. 98.2% of injured workers were men. the mean age of injured workers was 32.07 ± 9.12 years. the highest percentage belonged to ...

1991
Marie Collins William R. Ford Bhavani M. Thuraisingham

In a multilevel secure database management system (MLSDBMS). users cleared at different security levels access and share a database consisting of data at different sensitivity levels. A powerful and dynamic approach to assigning sensitivity levels (also called security levels) to data is one which utilizes security constraints or classification rules. Security constraints provide an effective a...

Journal: :Computing and Informatics 2013
Eun-Ae Cho Chang-Joo Moon Dae-Ha Park Kangbin Yim

Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even ∗ corresponding author Database Security System 1193 though they tried to apply more strict permissions in recent database systems, it was difficult to properly...

2011
Jenny Abramov Omer Anson Arnon Sturm Peretz Shoval

Security in general and database protection from unauthorized access in particular, are crucial for organizations. It has long been accepted that security requirements should be considered from the early stages of the development. However, such requirements tend to be neglected or dealt-with only at the end of the development process. The Security Modeling Tool presented in this study aims at e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید