To see the other types of publications on this topic, follow the link: Database security.

Journal articles on the topic 'Database security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Database security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Full text
Abstract:
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privilege, regularly updating and patching DBMS, conducting regular security audits, providing user awareness training, implementing data encryption, monitoring and logging database activities, developing an incident response plan, staying updated with the latest research and best practices, and continuously improving security measures. By following this methodology, organizations can effectively enhance the security of their databases and safeguard critical data from potential attacks and breaches. Emphasis is placed on regular review and updates to security measures to proactively address evolving threats and ensure continuous protection of sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Shivani. "A Comparative Study on Database Breach and Security in Contemporary Perspective." International Journal for Research in Applied Science and Engineering Technology 12, no. 8 (August 31, 2024): 11–16. http://dx.doi.org/10.22214/ijraset.2024.63853.

Full text
Abstract:
Abstract: In the modern technical landscape, database security has emerged as a critical concern. The primary goal of database security is to prevent unauthorized access and data modification while ensuring uninterrupted access to required services. Various security measures have been devised to safeguard databases, and numerous security models have been established, each focusing on different aspects of database security. The effectiveness of these security measures relies on the design and development of the database management system for protection. In the current environment where web applications with databases as a backend are proliferating, a secure database management system is vital, going beyond just securing the database itself. This paper focuses on database breaches, identifying the risks, security measures, and weaknesses in managing a Database Management System.
APA, Harvard, Vancouver, ISO, and other styles
3

Prof., Reshma Totare, Swamy Vishakha, Singh Anjali, and TejaswiniYadav. "MARKOV DECISION POLICY BASED DATABASE SECURITY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 22–24. https://doi.org/10.5281/zenodo.1411153.

Full text
Abstract:
An advanced database security system using Markov based policy is proposed. In large databases in this work, along with it’s a difficult task to keep the data up to date where huge data of dynamic nature occurs. In e-commerce sites, large data lands up and the database might not get updated. This causes staleness in data and also, if the database undergoes updation, it might not be available for access during that time. Sometimes, updation is not possible without human intervention, hence Markov based policy is used which would perform fixed interval updates effectively and lead to cost savings. In addition to updation, this policy can be used for the security of the system;the proposed system has a middleware that will restore the database using the Markov updation policy in case of attack. The middleware will process the changes in the data and display the details of the attacker and also the changes done by the attacker. Thus, this database system can also be secured using the Markov policy and this three layered security framework https://journalnx.com/journal-article/20150561
APA, Harvard, Vancouver, ISO, and other styles
4

Denning, D. E. "Database Security." Annual Review of Computer Science 3, no. 1 (June 1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lunt, Teresa F., and Eduardo B. Fernandez. "Database security." ACM SIGMOD Record 19, no. 4 (December 1990): 90–97. http://dx.doi.org/10.1145/122058.122069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Morrison, Paul. "Database Security." Network Security 2003, no. 6 (June 2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Parisi, Cameron, and Samantha Renicker. "Database security." Advances in Engineering Innovation 2, no. 1 (October 7, 2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.

Full text
Abstract:
In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The introductory segment delineates essential fortification strategies and succinctly touches upon optimal practices for shaping a database environments network topography and error mitigation methodologies. Subsequent to this panoramic insight, the discourse pivots to spotlight a diverse array of methodologies to discern and neutralize SQL injection forays.
APA, Harvard, Vancouver, ISO, and other styles
8

J C, Ogbonna, Nwokoma F O, and Ejem A. "Database Security Issues: A Review." International Journal of Science and Research (IJSR) 6, no. 8 (August 5, 2017): 1812–16. http://dx.doi.org/10.21275/art20176415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mubina, Malik, and Patel Trisha. "DATABASE SECURITY - ATTACKS AND CONTROL METHODS." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (March 27, 2016): 175–83. https://doi.org/10.5281/zenodo.7714485.

Full text
Abstract:
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. A secure database is the one which is reciprocated from different possible database attacks. Security models are required to develop for databases. These models are different in many aspects as they are dealing with different issues of the database security. They may different also because of they are taking different assumptions about what constitutes a secure database. So, it becomes very difficult for database security seekers to select appropriate model for securing their database. In this paper, we have discussed some of the attacks that can be possible with its counter measures and its control methods that can be possible. Securing database is important approach for the planning of explicit and directive based database security requirements. Ensuring security for database is very critical issues for the companies. As complexity of database increases, we may tend to have more complex security issues of database.  
APA, Harvard, Vancouver, ISO, and other styles
10

Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

ITAI, YAYA, AWODELE OLUDELE PhD, and NICOLAE GOGA PhD. "Trigger and Database Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (February 1, 2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.

Full text
Abstract:
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.
 
 
APA, Harvard, Vancouver, ISO, and other styles
12

Mehta, Raju. "Oracle Database Security." Information Systems Security 13, no. 5 (November 2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Harris, Duncan, and David Sidwell. "Distributed database security." Computers & Security 13, no. 7 (January 1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Mamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (July 30, 2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.

Full text
Abstract:
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today database security is getting greater importance than the past which is the amount of data is stored in a corporate database is increasing. People are depending more on the corporate data for making a decision, management of customer service and supply chain management etc. Data stored in databases is usually very vulnerable data so it becomes very important and crucial to maintain this data securely. There are many front end applications that fetch data from secondary storage to main memory for processing and from main memory, data is stored in cache for temporary processing. Any loss or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data. In this paper, I present a model where data is protected even on cache layer.
APA, Harvard, Vancouver, ISO, and other styles
15

Vineet, Patel, and Kulkarni Akanksha. "Brief Study on Database Security." Journal of Network Security and Data Mining 6, no. 2 (May 8, 2023): 16–22. https://doi.org/10.5281/zenodo.7906959.

Full text
Abstract:
<em>A database management system is frequently used by users to handle data protection, which is at the core of many security systems. The security of database management systems is the main topic of this essay, which serves as an illustration of how application security may be planned and implemented for certain tasks. Due to the fact that databases are more recent than programming languages and operating systems, there is currently a lot of interest in DB WS Security. Many commercial and governmental organizations depend on databases because they store data in a way that makes retrieving and maintaining it simple and effective. Because databases are a favourite target for attackers, their structure and contents are regarded as significant company assets that must be carefully protected. Similar to other computing systems, databases have some fundamental security requirements. Access control, excluding erroneous data, user authentication, and reliability are the main issues. The problems and dangers of database security are discussed in this paper.</em>
APA, Harvard, Vancouver, ISO, and other styles
16

Vishwakarma, Jaychand, and Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (January 30, 2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.

Full text
Abstract:
Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.
APA, Harvard, Vancouver, ISO, and other styles
17

Mammadova, Tamilla Abuseid k., Rana Faramaz k. Hajieva, and Zumrud Abuseid k. Murtuzalieva. "ORACLE MAXIMUM SECURITY ARCHITECTURE." Deutsche internationale Zeitschrift für zeitgenössische Wissenschaft 66 (October 19, 2023): 106–10. https://doi.org/10.5281/zenodo.10021896.

Full text
Abstract:
Oracle Database Vault (ODBV) user security issues concerning the rules of creation and its features superior to password protection. The use of ODBV in the banking sector was discussed. Oracle database administrators (ODBA) in the banking sector were informed about the problems that ODBA can cause and the importance of protecting confidential information.The Oracle Database (ODB) is one of the databases that stores information. It has database and user security to keep information confidential in ODB. It is critical in both the banking and financial sectors.
APA, Harvard, Vancouver, ISO, and other styles
18

Ahmad, Khaleel, Mohammad Shoaib Alam, and Nur Izura Udzir. "Security of NoSQL Database Against Intruders." Recent Patents on Engineering 13, no. 1 (February 8, 2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.

Full text
Abstract:
Background: The evolution of distributed web-based applications and cloud computing has brought about the demand to store a large amount of big data in distributed databases. Such efficient systems offer excessive availability and scalability to users. The new type of database resolves many new challenges especially in large-scale and high concurrency applications which are not present in the relational database. NoSQL refers to non-relational databases that are different from the Relational Database Management System. Objective: NoSQL has many features over traditional databases such as high scalability, distributed computing, lower cost, schema flexibility, semi or un-semi structural data and no complex relationship. Method: NoSQL databases are “BASE” Systems. The BASE (Basically Available, Soft state, Eventual consistency), formulates the CAP theorem the properties of which are used by BASE System. The distributed computer system cannot guarantee all of the following three properties at the same time that is consistency, availability and partition tolerance. Results: As progressively sharp big data is saved in NoSQL databases, it is essential to preserve higher security measures to ensure safe and trusted communication across the network. In this patent, we describe the security of NoSQL database against intruders which is growing rapidly. Conclusion: This patent also defines probably the most prominent NoSQL databases and describes their security aspects and problems.
APA, Harvard, Vancouver, ISO, and other styles
19

Pramod, Singh. "Three Layer Security Model for Distributed Relational Database." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (February 29, 2020): 3625–28. https://doi.org/10.35940/ijeat.B3183.029320.

Full text
Abstract:
Today we are living in a digital world where we all are connected to an open access network to exchange information. This information is more valuable assets that need protection from unauthenticated access. There are many security models has been proposed to protect the data stored in database but still needs more protection from attacks. In this study we have a three layer security model for relational database. Proposed model builds a security architecture based on access control policy, cryptography techniques and stored procedure. These mechanisms and techniques are combined together to present an interactive three-layer security model for securing relational databases in distributed environment. This model provides a kind of security controlling both in rests of database and data in motion from malicious user and other attacks.
APA, Harvard, Vancouver, ISO, and other styles
20

Dokka, Bharat Kumar, and Akshun Chhapola. "Database Security and Hardening." International Journal of Research in Modern Engineering & Emerging Technology 13, no. 4 (April 2025): 79–97. https://doi.org/10.63345/ijrmeet.org.v13.i4.5.

Full text
Abstract:
Database security and protection have become the most important areas of data management in an ever-changing digital environment. With technology changing day by day and the adoption of cloud computing, Internet of Things (IoT) devices, and mobile apps increasing, database protection has become increasingly difficult. The need to protect sensitive data from unauthorized access, tampering, and breaches has never been greater. While a great deal of research work has been spent on tried and tested database security measures, e.g., encryption, access control, and auditing, the new threats posed by new technologies—primarily NoSQL databases, cloud-native platforms, and hybrid configurations—demand innovation. The literature review takes into account the key developments in database security and hardening from 2015 to 2024 from various points of view such as encryption algorithms, Zero-Trust security architectures, and AI-based intrusion detection. There are still gaps in addressing some of the threats such as insider threats, mobile application security, and distributed database security on multi-cloud environments. Besides, regulatory compliance such as GDPR is still challenging for database administrators to implement in order to guarantee that security controls are up to the standards required by law. The research highlights that while existing frameworks and technologies provide a strong foundation for database security, there is a pressing need for adaptive multi-level security solutions incorporating newer advancements in artificial intelligence, machine learning, and blockchain technology. The current paper highlights the need for more research on how the newer technologies can be implemented in database security systems to bridge existing gaps and strengthen defense against emerging cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
21

Matey, Preeti. "Strengthening Database Security: RBAC, Encryption, Backup, and 2FA Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (December 23, 2024): 1–8. https://doi.org/10.55041/ijsrem39950.

Full text
Abstract:
Securing databases in modern IT environments is critical to ensuring the integrity, confidentiality, and availability of sensitive organizational data. This paper explores a multi-layered approach to database protection using Role-Based Access Control (RBAC), encryption, comprehensive backup strategies, disaster recovery planning, and Two-Factor Authentication (2FA). Each of these components addresses specific aspects of database security and collectively forms a robust framework to safeguard against unauthorized access, data breaches, and system failures. Practical recommendations for implementing these strategies in on-premises and production environments are provided, alongside discussions on emerging challenges and future trends in database security. Keywords: Database Security, RBAC, Encryption, Backup Strategies, Disaster Recovery, 2FA, Data Protection, Cybersecurity, Access Control, On-Premises, Production Environments.
APA, Harvard, Vancouver, ISO, and other styles
22

Alshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.

Full text
Abstract:
The increasing number of data breaches has led many organizations to focus on securing their IT infrastructures and application architectures. However, the main causes of many of the latest attacks are not associated with these two architectures. The damage caused by most of the recent attacks could have been minimized if more attention was given to enhancing the security of all components of the database architecture. The existing enterprise database architecture frameworks do not consider this issue a priority; hence, it has received minimal attention. The enterprise database architecture is the most important architecture because it is responsible for defining how all types of data, whether security-critical or not, are stored and accessed. This paper focuses on addressing the lack of a complete solution to help enterprise system architects to address the security of their organizations from early stages. The novelty of this approach is that it specifies how to modify the required artifacts by the enterprise database architecture to address security-critical data. The approach also defines a number of security measurements that help enterprise architects in measuring the security of the organization database based on those artifacts. These metrics are developed based on the results of a cybersecurity experiment conducted on 100 randomly selected open-source websites. The paper's contributions also consist of the definition of a number of security refactoring rules that specify how to modify current enterprise databases to make them more secure. This paper uses an existing relational diagram for a health clinic database to illustrate the application of the model to an existing database. The validity and applicability of these metrics and refactoring rules are proved using an experiment conducted on a number of security-related databases.
APA, Harvard, Vancouver, ISO, and other styles
23

Mocean, Loredana, and Miranda-Petronella Vlad. "Database Security in RDF Terms." Scientific Bulletin 28, no. 1 (June 1, 2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.

Full text
Abstract:
Abstract Databases are perhaps the most attacked and vulnerable elements in the online environment as far as organizations are concerned. The databases contain the most important information of an organization and its confidential data, along with those of its customers. However, little of the effort dedicated to security is intended to protect data. The present paper draws attention to the need to implement a simple and then complex security in a database using RDF (Resource Description Framework) based descriptions. Our example is one implemented for Microsoft Access and covers different security level descriptions considering attack types. We choose to represent the basic concepts and abstract syntax using the RDF data modeling vocabulary and we’re using as a starting point a legacy relational database where the company already catalogued attacks.
APA, Harvard, Vancouver, ISO, and other styles
24

Pangalos, G. J. "Medical database security evaluation." Medical Informatics 18, no. 4 (January 1993): 283–92. http://dx.doi.org/10.3109/14639239309025317.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Singhal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.

Full text
Abstract:
Abstract: There has been an explosion in data since last two decades and this explosion of data is due to high rates of data conversion and better internet services worldwide [21]. All the conventional methods of data handling have been replaced by much more sophisticated means. One of the typical shifts of the emerging information society is that information is becoming a crucial if not the most vital source. Information contrasts profoundly from further resources; for example and it can be imitative without cost, it can be erased without leaving traces. [22] Protecting the new resource information is a major issue in the information economy [20]. One such means is a Database. It makes it easier for data related queries butit can be dangerous if this data is leaked or sent outside the organization. A high price is positioned on confidentiality when information concerning statesecrets, business plans, war strategy, medical recordsand financial transactions needs to be stored or transmitted. Since its inception, the Internet has enable [19]. A cyber crime emerging in recent years data breachis one of the most notorious and disastrous data crimes majorly caused due to unsecure database. To secure these databases we can apply the concepts of AES algorithm. It is an algorithm used in cryptographywhich changes normal text to unreadable or cypher text. Keywords: Cryptography, AES, cypher, digitzation, confidentiality
APA, Harvard, Vancouver, ISO, and other styles
26

Pernul, G., and G. Luef. "Bibliography on database security." ACM SIGMOD Record 21, no. 1 (March 1992): 105–22. http://dx.doi.org/10.1145/130868.130884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Pangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.

Full text
Abstract:
AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care. The general framework and the requirements for medical database security are presented. The three prominent proposals for medical database security are discussed in some detail, together with specific proposals for medical database security. A number of parameters for a secure medical database development are presented and discussed, and guidelines are given for the development of secure medical database systems.
APA, Harvard, Vancouver, ISO, and other styles
28

Jajodia, Sushil. "Database security and privacy." ACM Computing Surveys 28, no. 1 (March 1996): 129–31. http://dx.doi.org/10.1145/234313.234370.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Munro, Ken. "Database security — an oxymoron?" Infosecurity Today 3, no. 6 (November 2006): 42. http://dx.doi.org/10.1016/s1742-6847(06)70485-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Pangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (August 1994): 159–71. http://dx.doi.org/10.1007/bf00996700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Pan, Xueying, Anthony Obahiaghon, Brendan Makar, Samuel Wilson, and Christian Beard. "Analysis of Database Security." OALib 11, no. 04 (2024): 1–19. http://dx.doi.org/10.4236/oalib.1111366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jasim, Khalid F., and Akram M. Zeki. "Design of Protection Software Using Some Cryptosystems for Cloud Database Files." Cihan University-Erbil Scientific Journal 8, no. 1 (June 30, 2024): 70–79. http://dx.doi.org/10.24086/cuesj.v8n1y2024.pp70-79.

Full text
Abstract:
The security of cloud databases may be a basic concern for organizations as they store and manage expansive volumes of delicate information within the cloud. Cryptosystems played an essential part in securing information privacy and integrity in these situations. This paper gives an in-depth investigation of the utilization of cryptosystems for cloud database security. The paper starts by talking about the foundation and importance of cloud database security, highlighting the expanding requirement for strong information security measures. A comprehensive study reviewed and investigated the current state of research in this space, distinguishing key progressions and challenges. The paper at that point digs into the execution of cryptosystems in cloud databases, looking at their execution and trade-offs. Besides, rising patterns and advances for improving cloud database security, such as multi-factor confirmation, homomorphic encryption, and blockchain, are discussed. The paper moreover recognizes different inquiries about openings and future headings within the field, counting various encryption methods, execution optimization, key administration, convenience enhancements, compliance contemplations, and integration with rising advances. Furthermore, we proposed encryption software for file protection, the software designed based on symmetric and asymmetric cryptosystems. The proposed software can be adapted for file protection in cloud database security. In conclusion, the paper emphasizes the significance of cryptosystems for cloud database security and underscores the requirement for continuous inquiry about and collaboration to address challenges and drive development in this zone.
APA, Harvard, Vancouver, ISO, and other styles
33

Teimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems." UHD Journal of Science and Technology 5, no. 2 (October 10, 2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.

Full text
Abstract:
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.
APA, Harvard, Vancouver, ISO, and other styles
34

Alshammari, Ahmad. "Structuring and organizing database security domain from big data perspective using meta-modeling approach." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 2 (February 2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.

Full text
Abstract:
Database security is an area focused on safeguarding databases against harmful access. It involves ensuring data accuracy, blocking unauthorized entry, and preventing harmful code within the database. Although various security models and methods exist, they often don't comprehensively cover all aspects of database security. This leads to a diverse and unclear understanding of database security among experts. This study proposes a unified framework, the Database Security Meta-model (DBSM), which acts as a standard language in this field. The DBSM, comprising twelve main elements, is thoroughly vetted to align with security needs and offers guidelines for practitioners to create specific security solutions.
APA, Harvard, Vancouver, ISO, and other styles
35

P.J, Sankaranarayanan, and Geogen George. "Blockchain Based Aadhaar Security." International Journal of Engineering & Technology 7, no. 4.6 (September 25, 2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.

Full text
Abstract:
A blockchain is a decentralized, disseminated and digital ledger that can’t be altered retroactively without modifying every single blocks and the consensus of the network. Blockchain can be used in smart contracts, Banks, IoT devices, Database management, etc., Due to recent times flaws and leakage of Aadhaar information (Aadhaar which is the largest government databases of the Indian citizens) in Internet the security and privacy of Aadhaar became questionable. In order to ensure the security of Aadhaar, Blockchain has the potential to overcome security and privacy challenges in Aadhaar. In this project we are going to create a Blockchain for Aadhaar database and implement light weight algorithm for efficiency, optimization and scalability along with the Blockchain securing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
36

Adelia Marwah Ujung and Muhammad Irwan Padli Nasution. "Sistem Keamanan Database." Jurnal Penelitian Teknologi Informasi dan Sains 1, no. 2 (June 30, 2023): 50–57. http://dx.doi.org/10.54066/jptis.v1i2.480.

Full text
Abstract:
This research is conducted with the aim of database security and protecting users' personal information. The study focuses on the database security system, which is an essential aspect in the field of information technology. The research is carried out by conducting a literature review and case studies on various existing database security systems. The fundamental concepts of the database security system, types of database security systems, and the latest technologies that can be used to enhance database security are explained in this research. Furthermore, the potential risks that can arise when the database security system is not properly maintained and strategies to address database security issues are also discussed. This research is expected to provide a better understanding of the importance of maintaining database security for organizations and companies.
APA, Harvard, Vancouver, ISO, and other styles
37

Arputharaj J, Vijay, and Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 1 (June 30, 2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.

Full text
Abstract:
The proposed method is a mixture of several security methods namely digital authentication tag along with the data mining in the DNA database. Data mining in the area of human genetics, an important goal is to understand the mapping relationship between the individual variation in human DNA sequences and variability in various algorithms for database security issues, for mutation susceptibility and parental identification differences. This paper primarily deals with the advancement of genetic algorithm with proper security features in DNA Databases and it enhances the special features in DNA database security. Several security methods include encryption algorithms, higher, not as much of multifaceted with trouble-free to apply in DNA Databases, used for protected database. The Reverse Encryption algorithm to protect data,Advance Cryptography algorithm to resist data, also Advanced Encryption Standard (AES) is most preferable for security in DNA databases.
APA, Harvard, Vancouver, ISO, and other styles
38

BAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (February 2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.

Full text
Abstract:
In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.
APA, Harvard, Vancouver, ISO, and other styles
39

Haikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, and Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (June 18, 2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.

Full text
Abstract:
The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve the security of their databases and protect sensitive information. These research findings demonstrate that enabling SSL encryption leads to longer average execution times for database operations. This latency can be attributed to the computational workload associated with SSL's encryption and decryption processes. However, the trade-off between performance and security is essential to safeguarding data in transit.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Dan Ning, Qi Li, and Xin Qiang Ma. "Research of Security Mechanisms Based on LogicSQL Database." Applied Mechanics and Materials 155-156 (February 2012): 352–56. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.352.

Full text
Abstract:
LogicSQL is an object relational database management system implemented with the advanced (formula-lock based) concurrency control protocol, and the steged database architecture. It is independently developed based on the Linux high-level security database system. Ministry of Science and Technology "863" Database Group of the major projects comments LogicSQL database "It is the only hope that China’s database products will be able to contend with America’s mainstream database products in the next few years." Access control policies are security policies that govern access to resources. It can be applied to several new types of databases. In this paper, we discuss access control in multilevel database management systems applies and illustrate the main applies of security mechanisms in the LogicSQL database system.
APA, Harvard, Vancouver, ISO, and other styles
41

Ansari, Sakil Ahmad, and Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (April 30, 2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.

Full text
Abstract:
Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. Concurrent execution of transactions may lead to contention for access to data, which in a multilevel secure DBMS (MLSIDBMS) may lead to insecurity. In this paper we examine security issues involved in database concurrency control for MLS/DBMSs and show how a scheduler can affect security. We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. We present a definition of DC Security based on noninterference. Two properties that constitute a necessary condition for DC-Security are introduced along with two other simpler necessary conditions. We have identified a class of schedulers we call Output-State-Equivalent for which another criterion implies DC-Security. The criterion considers separately the behavior of the scheduler in response to those inputs that cause rollback and those that do not. We characterize the security properties of several existing scheduling protocols and find many to be insecure
APA, Harvard, Vancouver, ISO, and other styles
42

QUASIM, MD.TABREZ. "Security Issues in Distributed Database System Model." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 12 (December 30, 2013): 396–99. https://doi.org/10.5281/zenodo.14613546.

Full text
Abstract:
This paper reviews the most common as well as emerging security mechanism used in distributed database system. As distributed database became more popular, the need for improvement in distributed database management system become even more important. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system. In this paper, we propose some solution for some security aspects such as multi-level access control, confidentiality, reliability, integrity and recovery that pertain to a distributed database system.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
43

Stenin, Dmitriy, Natalya Stenina, Arman Akanov, and Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes." E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.

Full text
Abstract:
This article discusses the issues of digitalization and using of information technologies, and in particular databases at all stages of the technological process of mining. In addition, the paper proposes options for protection against some of the possible attacks and information protection using countermeasures and control methods that exist at the present time. Database security is an important approach for planning and decision-making clear the security requirements of the database. Database security, especially for an industry such as mining, is a very important issue for companies. With increasing complexity of the databases, we may encounter with more complex problems related to information security.
APA, Harvard, Vancouver, ISO, and other styles
44

Salman Rasheed Owaid. "Security of encrypted cloud database." Наука і техніка Повітряних Сил Збройних Сил України, no. 2(31) (April 27, 2018): 122–30. http://dx.doi.org/10.30748/nitps.2018.31.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Muhammad Sani, Habiba, and Muhammad Mika'ilu Yabo. "A Database System Security Framework." International Journal of Computer Science and Information Technology 7, no. 6 (December 31, 2015): 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

RM, Deepa. "Database Security with Fingerprint Masking." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.

Full text
Abstract:
Abstract: Information in numerous areas including medication, business, and science wasso crucial, in which directories are utilized efficiently for information sharing.Nevertheless, the directories confront the danger to be pirated, taken or even misused, which might lead to many of protection risks regarding ownership rights, informationtampering as well as secrecy safeguards. Watermarking is the technology which is used to secure the database from the various attacks.It is also used to hide the content from the un authorized users. The majority of state-of-the- art techniques alter the initial information to a big level, lead to information quality wreckage,and then can't attain balance that is good between robustness from malicious strikes as well as information restoration. we suggest a reversible and robust watermarking method with Genetic Algorithm and Histogram ShiftingWatermarking (GAHSW) to relation the numerical data. This algorithm used to get the unique key for the database as well as the watermarked place. Experimental evaluation show the usefulness and methods within theterminology of robustness from malicious strikes as well as upkeep of information quality.We have achieved the security level on comparing with existing system
APA, Harvard, Vancouver, ISO, and other styles
47

Denning, D. E., S. G. Ak, M. Heckman, T. F. Lunt, M. Morgenstern, P. G. Neumann, and R. R. Schell. "Views for Multilevel Database Security." IEEE Transactions on Software Engineering SE-13, no. 2 (February 1987): 129–40. http://dx.doi.org/10.1109/tse.1987.232889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kang, Yue. "Legal Protection of Database Security." International Journal of Engineering Practical Research 4, no. 1 (2015): 38–41. http://dx.doi.org/10.12783/ijepr.2015.0401.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Yang, Li. "Teaching database security and auditing." ACM SIGCSE Bulletin 41, no. 1 (March 4, 2009): 241–45. http://dx.doi.org/10.1145/1539024.1508954.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Sarmah, Simanta Shekhar. "Database Security –Threats & Prevention." International Journal of Computer Trends and Technology 67, no. 5 (May 25, 2019): 46–53. http://dx.doi.org/10.14445/22312803/ijctt-v67i5p108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography