نتایج جستجو برای: database security

تعداد نتایج: 438645  

2015
Haibin Ma Chunyan Xie

Database application system mainly exists three aspects of insecurity: insecurity of data storage, fragilities of database application, the risk of secret data in the database. Refer to these three factors,This paper presents a multi-level structure security system, which includes decision-making level, code level, and data encryption level. This design enhances security of database site, secur...

1993
Günther Pernul Werner Winiwarter A Min Tjoa

of the database. The goal of the prototype is to achieve a concise and non-conflicting specification of the security constraints. Based on a concrete example of the application domain, the database designer and the security officer (or trusted users) are able to examine by using the prototype the adequacy of the database design and of the security classifications specified. In this paper we giv...

2002
Manying Qiu Steve Davis

People considering improvements in database security may benefit from this summary of security trade-offs, especially trade-offs between the level of security and the efficiency of the organization. Also this paper explains the most important database security features and describes how they have been implemented in three major commercial DBMS. The discussion covers features for protecting agai...

2015
Anjali Nayak

Cloud computing is a general term for the delivery of hosted services over the internet. Cloud computing enables companies to consume the resources and compute their utility rather than building and maintaining computing infrastructure. A cloud database is a database that has been optimized or built for a virtualized computing environment. Since these data-centers may be located in any part of ...

2000
Astrid Lubinski

Mobile work including mobile devices and wireless links comprehends a row of problems concerning security issues like availability, conndentiality, and accountability. Mobile processed information in database systems are distributed, heterogeneous, and repli-cated. They are endangered by various threats based on user's mobility and restricted mobile resources of portable devices and wireless li...

2014
Mohammad Iqbal Farid Ahmad Manoj Kumar Singh

The proposed strategy borrows from risk analysis methods and consists of nine elements. The first step is system characterization. This should be followed by identification of threats, gap identification, control analysis, determination of the likelihood of occurrence, an impact analysis, risk determination, recommendations for control and finally documentation of results. System characterizati...

2015
Rajani D. Singh S. B. Kishor Ali Amer Alwan Hamidah Ibrahim Nur Izura Udzir Kevin Hamlen Murat Kantarcioglu Latifur Khan Bhavani Thuraisingham Robert L. Totterdale Robert Morris

Database Security is the foundation of the new Electronic Business, E-Commerce and other Business System including Intranet and Extranet Users. The Internet and E-Commerce uses have ballooned and India has become an emerging power in the IT Enabled Services field. As Internet accessing costs are falling user's increases and India ranking in terms of Internet users is raising fast. Vulnerab...

2012
Dilip kumar Choubey Roopali Soni Joy Bhattacharjee

Web database is combination of database and web technology. Web database is placed on the Internet, there are many security problems. Web and distributed databases play the key role in most of these Web applications and thus it is critical to protect them from unauthorized access and malicious attacks. The secrecy and the integrity are two important demands of security system. When database acc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید