نتایج جستجو برای: Database Security

تعداد نتایج: 438645  

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

2009
Edgar R. Weippl

IntroductIon In this article we will present an introduction to issues relevant to database security and statistical database security. We will briefly cover various security models, elaborate on how data analysis in data warehouses (DWH) might compromise an individual's privacy, and explain which safeguards can be used to prevent attacks. In most companies, databases are an essential part of I...

Journal: :The Computer Journal 1982

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

2010
Paul Lesov

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by ob...

Correctness verification of query results is a significant challenge in database outsourcing. Most of the proposed approaches impose high overhead, which makes them impractical in real scenarios. Probabilistic approaches are proposed in order to reduce the computation overhead pertaining to the verification process. In this paper, we use the notion of trust as the basis of our probabilistic app...

Journal: :IEEE Transactions on Software Engineering 1987

Journal: :Scientific Bulletin 2023

Abstract Databases are perhaps the most attacked and vulnerable elements in online environment as far organizations concerned. The databases contain important information of an organization its confidential data, along with those customers. However, little effort dedicated to security is intended protect data. present paper draws attention need implement a simple then complex database using RDF...

Journal: :International Journal of Computer Science and Information Technology 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید