Siga este enlace para ver otros tipos de publicaciones sobre el tema: Database security.

Artículos de revistas sobre el tema "Database security"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Database security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Texto completo
Resumen
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privileg
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Sharma, Shivani. "A Comparative Study on Database Breach and Security in Contemporary Perspective." International Journal for Research in Applied Science and Engineering Technology 12, no. 8 (2024): 11–16. http://dx.doi.org/10.22214/ijraset.2024.63853.

Texto completo
Resumen
Abstract: In the modern technical landscape, database security has emerged as a critical concern. The primary goal of database security is to prevent unauthorized access and data modification while ensuring uninterrupted access to required services. Various security measures have been devised to safeguard databases, and numerous security models have been established, each focusing on different aspects of database security. The effectiveness of these security measures relies on the design and development of the database management system for protection. In the current environment where web appl
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Prof., Reshma Totare, Swamy Vishakha, Singh Anjali, and TejaswiniYadav. "MARKOV DECISION POLICY BASED DATABASE SECURITY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 22–24. https://doi.org/10.5281/zenodo.1411153.

Texto completo
Resumen
An advanced database security system using Markov based policy is proposed. In large databases in this work, along with it’s a difficult task to keep the data up to date where huge data of dynamic nature occurs. In e-commerce sites, large data lands up and the database might not get updated. This causes staleness in data and also, if the database undergoes updation, it might not be available for access during that time. Sometimes, updation is not possible without human intervention, hence Markov based policy is used which would perform fixed interval updates effectively and
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Denning, D. E. "Database Security." Annual Review of Computer Science 3, no. 1 (1988): 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Lunt, Teresa F., and Eduardo B. Fernandez. "Database security." ACM SIGMOD Record 19, no. 4 (1990): 90–97. http://dx.doi.org/10.1145/122058.122069.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Morrison, Paul. "Database Security." Network Security 2003, no. 6 (2003): 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Parisi, Cameron, and Samantha Renicker. "Database security." Advances in Engineering Innovation 2, no. 1 (2023): 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.

Texto completo
Resumen
In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The int
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

J C, Ogbonna, Nwokoma F O, and Ejem A. "Database Security Issues: A Review." International Journal of Science and Research (IJSR) 6, no. 8 (2017): 1812–16. http://dx.doi.org/10.21275/art20176415.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Mubina, Malik, and Patel Trisha. "DATABASE SECURITY - ATTACKS AND CONTROL METHODS." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (2016): 175–83. https://doi.org/10.5281/zenodo.7714485.

Texto completo
Resumen
In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. A secure database is the one which is reciprocated from different possible database attacks. Security models are required to develop for databases. These models are different in many aspects a
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian. "Database and database application security." ACM SIGCSE Bulletin 41, no. 3 (2009): 90–93. http://dx.doi.org/10.1145/1595496.1562909.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

ITAI, YAYA, AWODELE OLUDELE PhD, and NICOLAE GOGA PhD. "Trigger and Database Security." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 1 (2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.

Texto completo
Resumen
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various databa
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Mehta, Raju. "Oracle Database Security." Information Systems Security 13, no. 5 (2004): 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Harris, Duncan, and David Sidwell. "Distributed database security." Computers & Security 13, no. 7 (1994): 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Mamta Rani. "Database security at cache layer." International Journal of Science and Research Archive 9, no. 2 (2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.

Texto completo
Resumen
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial informatio
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Vineet, Patel, and Kulkarni Akanksha. "Brief Study on Database Security." Journal of Network Security and Data Mining 6, no. 2 (2023): 16–22. https://doi.org/10.5281/zenodo.7906959.

Texto completo
Resumen
<em>A database management system is frequently used by users to handle data protection, which is at the core of many security systems. The security of database management systems is the main topic of this essay, which serves as an illustration of how application security may be planned and implemented for certain tasks. Due to the fact that databases are more recent than programming languages and operating systems, there is currently a lot of interest in DB WS Security. Many commercial and governmental organizations depend on databases because they store data in a way that makes retrieving and
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Vishwakarma, Jaychand, and Abhishek Shukla. "Survey on Security Issues and Their Techniques in DBMS." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 1 (2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.

Texto completo
Resumen
Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with databas
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Mammadova, Tamilla Abuseid k., Rana Faramaz k. Hajieva, and Zumrud Abuseid k. Murtuzalieva. "ORACLE MAXIMUM SECURITY ARCHITECTURE." Deutsche internationale Zeitschrift für zeitgenössische Wissenschaft 66 (October 19, 2023): 106–10. https://doi.org/10.5281/zenodo.10021896.

Texto completo
Resumen
Oracle Database Vault (ODBV) user security issues concerning the rules of creation and its features superior to password protection. The use of ODBV in the banking sector was discussed. Oracle database administrators (ODBA) in the banking sector were informed about the problems that ODBA can cause and the importance of protecting confidential information.The Oracle Database (ODB) is one of the databases that stores information. It has database and user security to keep information confidential in ODB. It is critical in both the banking and financial sectors.
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Ahmad, Khaleel, Mohammad Shoaib Alam, and Nur Izura Udzir. "Security of NoSQL Database Against Intruders." Recent Patents on Engineering 13, no. 1 (2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.

Texto completo
Resumen
Background: The evolution of distributed web-based applications and cloud computing has brought about the demand to store a large amount of big data in distributed databases. Such efficient systems offer excessive availability and scalability to users. The new type of database resolves many new challenges especially in large-scale and high concurrency applications which are not present in the relational database. NoSQL refers to non-relational databases that are different from the Relational Database Management System. Objective: NoSQL has many features over traditional databases such as high
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Pramod, Singh. "Three Layer Security Model for Distributed Relational Database." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 3625–28. https://doi.org/10.35940/ijeat.B3183.029320.

Texto completo
Resumen
Today we are living in a digital world where we all are connected to an open access network to exchange information. This information is more valuable assets that need protection from unauthenticated access. There are many security models has been proposed to protect the data stored in database but still needs more protection from attacks. In this study we have a three layer security model for relational database. Proposed model builds a security architecture based on access control policy, cryptography techniques and stored procedure. These mechanisms and techniques are combined together to p
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Dokka, Bharat Kumar, and Akshun Chhapola. "Database Security and Hardening." International Journal of Research in Modern Engineering & Emerging Technology 13, no. 4 (2025): 79–97. https://doi.org/10.63345/ijrmeet.org.v13.i4.5.

Texto completo
Resumen
Database security and protection have become the most important areas of data management in an ever-changing digital environment. With technology changing day by day and the adoption of cloud computing, Internet of Things (IoT) devices, and mobile apps increasing, database protection has become increasingly difficult. The need to protect sensitive data from unauthorized access, tampering, and breaches has never been greater. While a great deal of research work has been spent on tried and tested database security measures, e.g., encryption, access control, and auditing, the new threats posed by
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Matey, Preeti. "Strengthening Database Security: RBAC, Encryption, Backup, and 2FA Solutions." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–8. https://doi.org/10.55041/ijsrem39950.

Texto completo
Resumen
Securing databases in modern IT environments is critical to ensuring the integrity, confidentiality, and availability of sensitive organizational data. This paper explores a multi-layered approach to database protection using Role-Based Access Control (RBAC), encryption, comprehensive backup strategies, disaster recovery planning, and Two-Factor Authentication (2FA). Each of these components addresses specific aspects of database security and collectively forms a robust framework to safeguard against unauthorized access, data breaches, and system failures. Practical recommendations for impleme
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Mocean, Loredana, and Miranda-Petronella Vlad. "Database Security in RDF Terms." Scientific Bulletin 28, no. 1 (2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.

Texto completo
Resumen
Abstract Databases are perhaps the most attacked and vulnerable elements in the online environment as far as organizations are concerned. The databases contain the most important information of an organization and its confidential data, along with those of its customers. However, little of the effort dedicated to security is intended to protect data. The present paper draws attention to the need to implement a simple and then complex security in a database using RDF (Resource Description Framework) based descriptions. Our example is one implemented for Microsoft Access and covers different sec
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Alshammari, Bandar M. "Security Assessment Model for Database Relational Designs." Journal of Medical Imaging and Health Informatics 9, no. 6 (2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.

Texto completo
Resumen
The increasing number of data breaches has led many organizations to focus on securing their IT infrastructures and application architectures. However, the main causes of many of the latest attacks are not associated with these two architectures. The damage caused by most of the recent attacks could have been minimized if more attention was given to enhancing the security of all components of the database architecture. The existing enterprise database architecture frameworks do not consider this issue a priority; hence, it has received minimal attention. The enterprise database architecture is
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Pangalos, G. J. "Medical database security evaluation." Medical Informatics 18, no. 4 (1993): 283–92. http://dx.doi.org/10.3109/14639239309025317.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Singhal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani, and Amit Sharma. "Database Security using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.

Texto completo
Resumen
Abstract: There has been an explosion in data since last two decades and this explosion of data is due to high rates of data conversion and better internet services worldwide [21]. All the conventional methods of data handling have been replaced by much more sophisticated means. One of the typical shifts of the emerging information society is that information is becoming a crucial if not the most vital source. Information contrasts profoundly from further resources; for example and it can be imitative without cost, it can be erased without leaving traces. [22] Protecting the new resource infor
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Pernul, G., and G. Luef. "Bibliography on database security." ACM SIGMOD Record 21, no. 1 (1992): 105–22. http://dx.doi.org/10.1145/130868.130884.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Pangalos, G. J. "Medical Database Security Policies." Methods of Information in Medicine 32, no. 05 (1993): 349–56. http://dx.doi.org/10.1055/s-0038-1634952.

Texto completo
Resumen
AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care. The general framework and the requirements for medical database security are presented. The three prominent proposals for medical database security are discussed in some detail, together with specific proposals for medical database security. A number of parameters for a secure medical database development are presented and disc
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Jajodia, Sushil. "Database security and privacy." ACM Computing Surveys 28, no. 1 (1996): 129–31. http://dx.doi.org/10.1145/234313.234370.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Munro, Ken. "Database security — an oxymoron?" Infosecurity Today 3, no. 6 (2006): 42. http://dx.doi.org/10.1016/s1742-6847(06)70485-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Pangalos, G., M. Khair, and L. Bozios. "Enhancing medical database security." Journal of Medical Systems 18, no. 4 (1994): 159–71. http://dx.doi.org/10.1007/bf00996700.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Pan, Xueying, Anthony Obahiaghon, Brendan Makar, Samuel Wilson, and Christian Beard. "Analysis of Database Security." OALib 11, no. 04 (2024): 1–19. http://dx.doi.org/10.4236/oalib.1111366.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Jasim, Khalid F., and Akram M. Zeki. "Design of Protection Software Using Some Cryptosystems for Cloud Database Files." Cihan University-Erbil Scientific Journal 8, no. 1 (2024): 70–79. http://dx.doi.org/10.24086/cuesj.v8n1y2024.pp70-79.

Texto completo
Resumen
The security of cloud databases may be a basic concern for organizations as they store and manage expansive volumes of delicate information within the cloud. Cryptosystems played an essential part in securing information privacy and integrity in these situations. This paper gives an in-depth investigation of the utilization of cryptosystems for cloud database security. The paper starts by talking about the foundation and importance of cloud database security, highlighting the expanding requirement for strong information security measures. A comprehensive study reviewed and investigated the cur
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Teimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems." UHD Journal of Science and Technology 5, no. 2 (2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.

Texto completo
Resumen
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter di
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Alshammari, Ahmad. "Structuring and organizing database security domain from big data perspective using meta-modeling approach." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 2 (2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.

Texto completo
Resumen
Database security is an area focused on safeguarding databases against harmful access. It involves ensuring data accuracy, blocking unauthorized entry, and preventing harmful code within the database. Although various security models and methods exist, they often don't comprehensively cover all aspects of database security. This leads to a diverse and unclear understanding of database security among experts. This study proposes a unified framework, the Database Security Meta-model (DBSM), which acts as a standard language in this field. The DBSM, comprising twelve main elements, is thoroughly
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

P.J, Sankaranarayanan, and Geogen George. "Blockchain Based Aadhaar Security." International Journal of Engineering & Technology 7, no. 4.6 (2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.

Texto completo
Resumen
A blockchain is a decentralized, disseminated and digital ledger that can’t be altered retroactively without modifying every single blocks and the consensus of the network. Blockchain can be used in smart contracts, Banks, IoT devices, Database management, etc., Due to recent times flaws and leakage of Aadhaar information (Aadhaar which is the largest government databases of the Indian citizens) in Internet the security and privacy of Aadhaar became questionable. In order to ensure the security of Aadhaar, Blockchain has the potential to overcome security and privacy challenges in Aadhaar. In
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Arputharaj J, Vijay, and Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 1 (2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.

Texto completo
Resumen
The proposed method is a mixture of several security methods namely digital authentication tag along with the data mining in the DNA database. Data mining in the area of human genetics, an important goal is to understand the mapping relationship between the individual variation in human DNA sequences and variability in various algorithms for database security issues, for mutation susceptibility and parental identification differences. This paper primarily deals with the advancement of genetic algorithm with proper security features in DNA Databases and it enhances the special features in DNA d
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Adelia Marwah Ujung and Muhammad Irwan Padli Nasution. "Sistem Keamanan Database." Jurnal Penelitian Teknologi Informasi dan Sains 1, no. 2 (2023): 50–57. http://dx.doi.org/10.54066/jptis.v1i2.480.

Texto completo
Resumen
This research is conducted with the aim of database security and protecting users' personal information. The study focuses on the database security system, which is an essential aspect in the field of information technology. The research is carried out by conducting a literature review and case studies on various existing database security systems. The fundamental concepts of the database security system, types of database security systems, and the latest technologies that can be used to enhance database security are explained in this research. Furthermore, the potential risks that can arise w
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

BAI, YUN, and YAN ZHANG. "ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 01 (2004): 3–17. http://dx.doi.org/10.1142/s0218001404003022.

Texto completo
Resumen
In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Haikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, and Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.

Texto completo
Resumen
The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Li, Dan Ning, Qi Li, and Xin Qiang Ma. "Research of Security Mechanisms Based on LogicSQL Database." Applied Mechanics and Materials 155-156 (February 2012): 352–56. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.352.

Texto completo
Resumen
LogicSQL is an object relational database management system implemented with the advanced (formula-lock based) concurrency control protocol, and the steged database architecture. It is independently developed based on the Linux high-level security database system. Ministry of Science and Technology "863" Database Group of the major projects comments LogicSQL database "It is the only hope that China’s database products will be able to contend with America’s mainstream database products in the next few years." Access control policies are security policies that govern access to resources. It can
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Ansari, Sakil Ahmad, and Jaychand Vishwakarma. "Survey on Database Concurrency Control in Multilevel Secure Database Management Systems." International Journal of Advanced Research in Computer Science and Software Engineering 8, no. 4 (2018): 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.

Texto completo
Resumen
Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. Concurrent execution of transactions may lead to contention for access to data, which in a multilevel secure DBMS (MLSIDBMS) may lead to insecurity. In this paper we examine security issues involved in database concurrency control for MLS/DBMSs and show how a scheduler can affect security. We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. We present a definition of DC Secu
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

QUASIM, MD.TABREZ. "Security Issues in Distributed Database System Model." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 12 (2013): 396–99. https://doi.org/10.5281/zenodo.14613546.

Texto completo
Resumen
This paper reviews the most common as well as emerging security mechanism used in distributed database system. As distributed database became more popular, the need for improvement in distributed database management system become even more important. The most important issue is security that may arise and possibly compromise the access control and the integrity of the system. In this paper, we propose some solution for some security aspects such as multi-level access control, confidentiality, reliability, integrity and recovery that pertain to a distributed database system.&nbsp;
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Stenin, Dmitriy, Natalya Stenina, Arman Akanov, and Kakim Sagindikov. "Digitalization and Innovative Development of Mining Processes." E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.

Texto completo
Resumen
This article discusses the issues of digitalization and using of information technologies, and in particular databases at all stages of the technological process of mining. In addition, the paper proposes options for protection against some of the possible attacks and information protection using countermeasures and control methods that exist at the present time. Database security is an important approach for planning and decision-making clear the security requirements of the database. Database security, especially for an industry such as mining, is a very important issue for companies. With i
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Margaret Dumebi Okpor, Kizito Eluemunor Anazia, and Daniel Ukpenusiowho. "A novel hybrid database security management technique." International Journal of Science and Research Archive 11, no. 2 (2024): 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.

Texto completo
Resumen
Since the advent of the internet and the digitization of information, more individuals and organizations have gained access to the internet, leading to a significant expansion in the size of our database systems. These databases are relied upon for day-to-day activities by individuals and organizations. Furthermore, the advancements in technology have increased the vulnerability of database management systems and enforcing adequate database security measures is of paramount importance to individuals and organizations. In this study, we deployed a hybrid approach to database security system tha
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Salman Rasheed Owaid. "Security of encrypted cloud database." Наука і техніка Повітряних Сил Збройних Сил України, no. 2(31) (April 27, 2018): 122–30. http://dx.doi.org/10.30748/nitps.2018.31.16.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Muhammad Sani, Habiba, and Muhammad Mika'ilu Yabo. "A Database System Security Framework." International Journal of Computer Science and Information Technology 7, no. 6 (2015): 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

RM, Deepa. "Database Security with Fingerprint Masking." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.

Texto completo
Resumen
Abstract: Information in numerous areas including medication, business, and science wasso crucial, in which directories are utilized efficiently for information sharing.Nevertheless, the directories confront the danger to be pirated, taken or even misused, which might lead to many of protection risks regarding ownership rights, informationtampering as well as secrecy safeguards. Watermarking is the technology which is used to secure the database from the various attacks.It is also used to hide the content from the un authorized users. The majority of state-of-the- art techniques alter the init
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Denning, D. E., S. G. Ak, M. Heckman, et al. "Views for Multilevel Database Security." IEEE Transactions on Software Engineering SE-13, no. 2 (1987): 129–40. http://dx.doi.org/10.1109/tse.1987.232889.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Kang, Yue. "Legal Protection of Database Security." International Journal of Engineering Practical Research 4, no. 1 (2015): 38–41. http://dx.doi.org/10.12783/ijepr.2015.0401.08.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Yang, Li. "Teaching database security and auditing." ACM SIGCSE Bulletin 41, no. 1 (2009): 241–45. http://dx.doi.org/10.1145/1539024.1508954.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!