نتایج جستجو برای: database security

تعداد نتایج: 438645  

Journal: :International Journal of Computer Applications 2012

2010
Meg C. Murray Anthony Scime Meg Coffin Murray

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical I...

2014
Yanjun Liu Chin-Chen Chang

Database security prevents the disclosure of confidential data within a database to unauthorized users, and has become an urgent challenge for a tremendous number of database applications. Data encryption is a widely-used cryptographic technique for realizing database security in which the data kept in the database are encrypted into ciphertext. Inspired by Lin et al.’s database encryption syst...

2005
Alban Gabillon

In this paper, we define a security model [14] for a native XML database which supports the XUpdate language. Our model is inspired by the SQL security model which is the most famous security model for database. We first define a generic access control model for tree data structures. Then, we apply our model to an XML database which supports the Xupdate language.

Journal: :Studies in health technology and informatics 1997
M Khair G Pangalos F Andria L Bozios

This paper describes the methodology used and the experience gained from the application of a new secure database design approach and database security policy in a real life hospital environment. The applicability of the proposed database security policy in a major Greek general hospital is demonstrated. Moreover, the security and quality assurance of the developed prototype secure database is ...

1992
Kenneth P. Smith Marianne Winslett

Traditional database security is made more complex by the addition of rules to the data model. The security policy must control access privileges and accessibility for rule descriptions, executing rules, and database transitions (events). In this paper we extend the multilevel secure relational model to capture the functionality required of an active database, i. e. a database with production r...

1998
Nasiruddin Ahmed

Real-time database systems, such as military command, control and communication, avionics, radar tracking, and managing automated factories, have timing constraints and temporal consistency constraints. The timing constraint requires a transaction to be completed by a specified deadline. The temporal consistency constraints require that data read by a transaction be up-to-date. In such environm...

Shahidul Islam, Varghese Manaloor,

Background: Food security has been a target in India since its independence; the primary aim of food security is to ensure enough staple food for the entire population. Although substantial progress was made through the adoption of green revolution (GR) technologies and implementation of the food public distribution system (PDS), desirable food and nutrition security, as defined by the food and...

2017
Sarbani Roy Arpita Maitra Sourav Mukhopadhyay

Measurement Device Independent Quantum Private Query (MDI QPQ) with qutrits is presented. We identified that this variant of QPQ protocol resists the optimization of both database security and client’s privacy simultaneously. We compare the database security and client’s privacy in MDI QPQ for qubits with qutrits. For some instances, we observe that qutrit will provide better security for datab...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید