نتایج جستجو برای: database security
تعداد نتایج: 438645 فیلتر نتایج به سال:
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical I...
Database security prevents the disclosure of confidential data within a database to unauthorized users, and has become an urgent challenge for a tremendous number of database applications. Data encryption is a widely-used cryptographic technique for realizing database security in which the data kept in the database are encrypted into ciphertext. Inspired by Lin et al.’s database encryption syst...
In this paper, we define a security model [14] for a native XML database which supports the XUpdate language. Our model is inspired by the SQL security model which is the most famous security model for database. We first define a generic access control model for tree data structures. Then, we apply our model to an XML database which supports the Xupdate language.
This paper describes the methodology used and the experience gained from the application of a new secure database design approach and database security policy in a real life hospital environment. The applicability of the proposed database security policy in a major Greek general hospital is demonstrated. Moreover, the security and quality assurance of the developed prototype secure database is ...
Traditional database security is made more complex by the addition of rules to the data model. The security policy must control access privileges and accessibility for rule descriptions, executing rules, and database transitions (events). In this paper we extend the multilevel secure relational model to capture the functionality required of an active database, i. e. a database with production r...
Real-time database systems, such as military command, control and communication, avionics, radar tracking, and managing automated factories, have timing constraints and temporal consistency constraints. The timing constraint requires a transaction to be completed by a specified deadline. The temporal consistency constraints require that data read by a transaction be up-to-date. In such environm...
Background: Food security has been a target in India since its independence; the primary aim of food security is to ensure enough staple food for the entire population. Although substantial progress was made through the adoption of green revolution (GR) technologies and implementation of the food public distribution system (PDS), desirable food and nutrition security, as defined by the food and...
Measurement Device Independent Quantum Private Query (MDI QPQ) with qutrits is presented. We identified that this variant of QPQ protocol resists the optimization of both database security and client’s privacy simultaneously. We compare the database security and client’s privacy in MDI QPQ for qubits with qutrits. For some instances, we observe that qutrit will provide better security for datab...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید