نتایج جستجو برای: database security
تعداد نتایج: 438645 فیلتر نتایج به سال:
Database application system mainly exists three aspects of insecurity: insecurity of data storage, fragilities of database application, the risk of secret data in the database. Refer to these three factors,This paper presents a multi-level structure security system, which includes decision-making level, code level, and data encryption level. This design enhances security of database site, secur...
of the database. The goal of the prototype is to achieve a concise and non-conflicting specification of the security constraints. Based on a concrete example of the application domain, the database designer and the security officer (or trusted users) are able to examine by using the prototype the adequacy of the database design and of the security classifications specified. In this paper we giv...
People considering improvements in database security may benefit from this summary of security trade-offs, especially trade-offs between the level of security and the efficiency of the organization. Also this paper explains the most important database security features and describes how they have been implemented in three major commercial DBMS. The discussion covers features for protecting agai...
Cloud computing is a general term for the delivery of hosted services over the internet. Cloud computing enables companies to consume the resources and compute their utility rather than building and maintaining computing infrastructure. A cloud database is a database that has been optimized or built for a virtualized computing environment. Since these data-centers may be located in any part of ...
Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...
The proposed strategy borrows from risk analysis methods and consists of nine elements. The first step is system characterization. This should be followed by identification of threats, gap identification, control analysis, determination of the likelihood of occurrence, an impact analysis, risk determination, recommendations for control and finally documentation of results. System characterizati...
Database Security is the foundation of the new Electronic Business, E-Commerce and other Business System including Intranet and Extranet Users. The Internet and E-Commerce uses have ballooned and India has become an emerging power in the IT Enabled Services field. As Internet accessing costs are falling user's increases and India ranking in terms of Internet users is raising fast. Vulnerab...
Web database is combination of database and web technology. Web database is placed on the Internet, there are many security problems. Web and distributed databases play the key role in most of these Web applications and thus it is critical to protect them from unauthorized access and malicious attacks. The secrecy and the integrity are two important demands of security system. When database acc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید