Gotowa bibliografia na temat „Transparent Data Encryption (TDE)”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Transparent Data Encryption (TDE)”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Transparent Data Encryption (TDE)"

1

Vijay, Kumar Tiwari. "About Oracle TDE (Transparent Data Encryption)." International Journal of Trend in Scientific Research and Development 4, no. 1 (2019): 1085. https://doi.org/10.5281/zenodo.3609978.

Pełny tekst źródła
Streszczenie:
The Transparent Data Encryption feature was announced in Oracle 10g Database Release 2 to simplify the encryption of data within datafiles, tables stopping access to it from the operating system. Tablespace encryption extends this technology, allowing encryption of the entire insides of a tablespace and tables. Vijay Kumar Tiwari "About Oracle TDE (Transparent Data Encryption)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29814.pdf
Style APA, Harvard, Vancouver, ISO itp.
2

Researcher. "DATA PROTECTION STRATEGIES WITH ORACLE 19C TDE." International Journal of Information Security (IJIS) 3, no. 2 (2024): 1–22. https://doi.org/10.5281/zenodo.13169157.

Pełny tekst źródła
Streszczenie:
In today’s age safeguarding data privacy and security has become a priority, for organizations in various industries. The rise in cyber threats and strict regulations highlight the need for measures to secure data. The findings indicate that Oracle 19c TDE offers a seamless and effective solution for data encryption, balancing security and performance. TDE offers functionality that streamlines encryption methods. Transparent Data Encryption (TDE) plays a role in addressing these security concerns by encrypting database files at the storage level ensuring data protection while avoiding th
Style APA, Harvard, Vancouver, ISO itp.
3

Beley, Olexander. "FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE." Informatyka Automatyka Pomiary w Gospodarce i Ochronie Środowiska 8, no. 4 (2018): 12–15. http://dx.doi.org/10.5604/01.3001.0012.8013.

Pełny tekst źródła
Streszczenie:
The main principles of data security and access organization in the Microsoft Azure cloud storage are considered. A role of hierarchy and access keys are presented. We describe the setup and the use of their keys (BYOK) for transparent data encryption (TDE) using Azure Key Vault keyring.
Style APA, Harvard, Vancouver, ISO itp.
4

Sirisha, N., and K. V.D. Kiran. "Authorization of Data In Hadoop Using Apache Sentry." International Journal of Engineering & Technology 7, no. 3.6 (2018): 234. http://dx.doi.org/10.14419/ijet.v7i3.6.14978.

Pełny tekst źródła
Streszczenie:
Big Data has become more popular, as it can provide on-demand, reliable and flexible services to users such as storage and its processing. The data security has become a major issue in the Big data. The open source HDFS software is used to store huge amount of data with high throughput and fault tolerance and Map Reduce is used for its computations and processing. However, it is a significant target in the Hadoop system, security model was not designed and became the major drawback of Hadoop software. In terms of storage, meta data security, sensitive data and also the data security will be an
Style APA, Harvard, Vancouver, ISO itp.
5

Researcher. "COMPREHENSIVE REVIEW OF INNOVATIONS IN CLOUD INFRASTRUCTURE, AI-DRIVEN CYBERSECURITY, AND ADVANCED IPTV TECHNOLOGIES." Journal of Software Engineering (JSE) 2, no. 2 (2024): 33–42. https://doi.org/10.5281/zenodo.14055967.

Pełny tekst źródła
Streszczenie:
This paper provides a detailed review of recent advancements in cloud infrastructure automation, artificial intelligence (AI) applications in cybersecurity, and advanced IPTV technologies, highlighting their transformative roles in digital innovation. Key areas explored include Terraform’s capabilities in Infrastructure as Code (IaC), which significantly enhance automation in cloud environments, alongside AI-driven security protocols that fortify threat detection and response mechanisms. Furthermore, the paper examines Very Large Scale Integration (VLSI) implementations in IPTV for optim
Style APA, Harvard, Vancouver, ISO itp.
6

Sibaram, Prasad Panda. "Data Security Mechanisms in Database Management." International Journal of Computer Application 15, no. 3 (2025): 1–14. https://doi.org/10.5281/zenodo.15469196.

Pełny tekst źródła
Streszczenie:
<strong>Abstract-</strong> Database security has gained wide notoriety among many individuals worldwide due to the increase in publicized incidents of the loss of or unauthorized exposure to sensitive or confidential data from major corporations, government agencies, and academic institutions. The amount of data collected, retained, and shared electronically by many institutions is steadily increasing. Consequently, the need for individuals to understand the issues, challenges, and available solutions of database security is being realized. At its core, database security strives to ensure that
Style APA, Harvard, Vancouver, ISO itp.
7

Kaliappan, Vishnu Kumar, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, and Enumi Choi. "High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption." Energies 15, no. 15 (2022): 5544. http://dx.doi.org/10.3390/en15155544.

Pełny tekst źródła
Streszczenie:
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based applications. Because their use is growing on its own and is still in its early phases, these technologies will face a slew of security issues. Vulnerabilities and malware in Docker container images are two serious security concerns. The risk of privilege escalation is increased because Docker containers share the Linux kernel. This study presen
Style APA, Harvard, Vancouver, ISO itp.
8

Alohali, Manal Abdullah, Mohammed Aljebreen, Fuad Al-Mutiri, et al. "Blockchain-Driven Image Encryption Process with Arithmetic Optimization Algorithm for Security in Emerging Virtual Environments." Sustainability 15, no. 6 (2023): 5133. http://dx.doi.org/10.3390/su15065133.

Pełny tekst źródła
Streszczenie:
The real world is bounded by people, hospitals, industries, buildings, businesses, vehicles, cognitive cities, and billions of devices that offer various services and interact with the world. Recent technologies, including AR, VR, XR, and the digital twin concept, provide advanced solutions to create a new virtual world. Due to the ongoing development of information communication technologies and broadcast channels, data security has become a major concern. Blockchain (BC) technology is an open, decentralized, and transparent distributed database that can be maintained by the group. BC’s major
Style APA, Harvard, Vancouver, ISO itp.
9

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.

Pełny tekst źródła
Streszczenie:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
Style APA, Harvard, Vancouver, ISO itp.
10

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.

Pełny tekst źródła
Streszczenie:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction informati
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Transparent Data Encryption (TDE)"

1

Moulianitakis, Feidias, and Konstantinos Asimakopoulos. "Benchmarking Framework for Transparent Data Encryption Systems." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75814.

Pełny tekst źródła
Streszczenie:
In the digital world of today, information is always at risk regardless of its state, at rest or in transit. Cryptography is the technology that promises to address the security issues that emerge. Hence, it was a reasonable consequence to introduce cryptography to databases. However, manually encrypting and decrypting data along with the key management is a burden for the regular user of a database. The need for removing this burden gave birth to Transparent Data Encryption (TDE).   TDE technology is widely available nowadays and a number of vendors have developed their own solutions for prot
Style APA, Harvard, Vancouver, ISO itp.
2

Junior, Marcos Antonio Simplício. "Algoritmos de autenticação de mensagens para redes de sensores." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-11082010-114456/.

Pełny tekst źródła
Streszczenie:
Prover segurança às informações trafegadas nos mais diversos tipos de redes é algo essencial. Entretanto, redes altamente dependentes de dispositivos com recursos limitados (como sensores, tokens e smart cards) apresentam um desafio importante: a reduzida disponibilidade de memória e energia destes dispositivos, bem como sua baixa capacidade de processamento, dificultam a utilização de diversos algoritmos criptográficos considerados seguros atualmente. Este é o caso não apenas de cifras simétricas, que proveem confidencialidade aos dados, mas também de MACs (Message Authentication Code, ou Cód
Style APA, Harvard, Vancouver, ISO itp.
3

(6012225), Huian Li. "Transparent and Mutual Restraining Electronic Voting." Thesis, 2019.

Znajdź pełny tekst źródła
Streszczenie:
Many e-voting techniques have been proposed but not widely used in reality. One of the problems associated with most of existing e-voting techniques is the lack of transparency, leading to a failure to deliver voter assurance. In this work, we propose a transparent, auditable, end-to-end verifiable, and mutual restraining e-voting protocol that exploits the existing multi-party political dynamics such as in the US. The new e-voting protocol consists of three original technical contributions -- universal verifiable voting vector, forward and backward mutual lock voting, and in-process check an
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Transparent Data Encryption (TDE)"

1

Blinn, Eric. SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Routledge, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Anderson, Patrick D. Cypherpunk Ethics: Radical Ethics for the Digital Age. Taylor & Francis Group, 2022.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Transparent Data Encryption (TDE)"

1

Gasser, Linus, and Imad Aad. "Disk, File and Database Encryption." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_33.

Pełny tekst źródła
Streszczenie:
AbstractDisk, file, and database encryption are technologies that protect data confidentiality when stored. Full disk encryption encrypts all data on a disk except the part containing the code to unlock the rest of the disk, which is usually not encrypted. File-based encryption operates at the file level and can be done by the operating system or an application. Database encryption can be done using transparent database encryption, column-level encryption, or field-level encryption. Both full disk encryption and File-based encryption allow good protection against data leakage in the case of de
Style APA, Harvard, Vancouver, ISO itp.
2

Coles, Michael, and Rodney Landrum. "Transparent Data Encryption." In Expert SQL Server 2008 Encryption. Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-3365-7_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

McGiffen, Matthew. "Introducing Transparent Data Encryption." In Pro Encryption in SQL Server 2022. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8664-7_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Barać, Zoran, and Daniel Scott-Raynsford. "Configuring Transparent Data Encryption to Bring Your Own Key." In Azure SQL Hyperscale Revealed. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9225-9_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chang, Chaowen, Shuai Wang, Yutong Wang, and PeiSheng Han. "Research of Terminal Transparent Encryption Storage Mechanism for Multi-cloud Disks." In Cloud Computing and Big Data. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28430-9_28.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Teijeiro, Lucía Gómez, and Thomas Maillart. "Trends in Open Source Software for Data Protection and Encryption Technologies." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_40.

Pełny tekst źródła
Streszczenie:
AbstractSoftware editors and practitioners have increasingly developed and used open-source software tools to implement their cybersecurity strategies. By its unique intellectual property regime, open-source software fosters transparency and sharing values, which have been recognized as important to finding and fixing vulnerabilities and quickly avoiding threats. By selecting 41 technologies related to the one presented in the book, we show that open-source software for cybersecurity is a rapidly growing complex ecosystem of 3456 GitHub repositories with 5000+ users. While some repositories ar
Style APA, Harvard, Vancouver, ISO itp.
7

Majumdar, Subhabrata. "Standards for LLM Security." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_25.

Pełny tekst źródła
Streszczenie:
AbstractThe National Institute of Standards and Technology (NIST) is a recognized authority on computer security that publishes guidelines and standards for a broad range of technologies, including artificial intelligence (AI). The guidelines include the requirement for LLM decision-making transparency, explainability, testing, and validation to guarantee model reliability and security. Moreover, the NIST has also created standards for cryptography, a critical element of many LLM-based applications, such as secure communication and data encryption. The cryptography standards help ensure that L
Style APA, Harvard, Vancouver, ISO itp.
8

Blinn, Eric. "Managing TDE." In SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Blinn, Eric. "Moving a TDE Enabled Database." In SQL Server Transparent Data Encryption. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5922-1_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Mannan, Mamun Abdul. "Data Privacy in E-Commerce." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. https://doi.org/10.4018/979-8-3693-9491-5.ch017.

Pełny tekst źródła
Streszczenie:
To explore the challenges of data privacy in e-commerce and to identify best practices for protecting consumer data in online transactions. The chapter uses library and document analysis to review case studies, industry reports, and academic literature on data privacy in e-commerce.The chapter assesses how e-commerce platforms handle consumer data and the effectiveness of various privacy measures. The major findings of the chapter is that e-commerce platforms face significant challenges in protecting consumer data, including issues related to data breaches, inadequate privacy policies, and evo
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Transparent Data Encryption (TDE)"

1

Ma, Junchao, Yu Tian, Yanchang Feng, et al. "ZTKA: A Zero-Trust Based Kernel Encryption Architecture for Transparent Data Protection." In 2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2025. https://doi.org/10.1109/cscwd64889.2025.11033649.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Zhan, Wei, Bo Jin, Huan Xu, and Chenxi Dong. "Data Security Management Based on Transparent Encryption Policy." In 2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2022. http://dx.doi.org/10.1109/icmnwc56175.2022.10032001.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yang, Xuelin, Amber Sultan, Adnan Hajomer, Liuming Zhang, and Weisheng Hu. "Physical-Layer OFDM Data Encryption using Chaotic QAM Mapping." In 2019 21st International Conference on Transparent Optical Networks (ICTON). IEEE, 2019. http://dx.doi.org/10.1109/icton.2019.8840402.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Pang, Pengfei, Khaled Aourra, Yuan Xue, YuanZhang Li, and QuanXin Zhang. "A Transparent Encryption Scheme of Video Data for Android Devices." In 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2017. http://dx.doi.org/10.1109/cse-euc.2017.163.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Han Chen, Xuelin Yang, Weiqiang Sun, and Weisheng Hu. "Physical-layer OFDM data encryption using chaotic ZCMT precoding matrix." In 2017 19th International Conference on Transparent Optical Networks (ICTON). IEEE, 2017. http://dx.doi.org/10.1109/icton.2017.8024916.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Geng, Cong, Xuelin Yang, Weiqiang Sun, and Weisheng Hu. "Multi-Fold Physical Layer Data Encryption Using Chaotic Frequency Hopping." In 2018 20th International Conference on Transparent Optical Networks (ICTON). IEEE, 2018. http://dx.doi.org/10.1109/icton.2018.8473904.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Natarajan, K., and Vaheedbasha Shaik. "Transparent Data Encryption: Comparative Analysis and Performance Evaluation of Oracle Databases." In 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN). IEEE, 2020. http://dx.doi.org/10.1109/icrcicn50933.2020.9296168.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Lukaj, Valeria, Alessio Catalfamo, Francesco Martella, Maria Fazio, Massimo Villari, and Antonio Celesti. "A NoSQL DBMS Transparent Data Encryption Approach for Cloud/Edge Continuum." In 2023 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2023. http://dx.doi.org/10.1109/iscc58397.2023.10217933.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Raddo, Thiago R., Simon Rommel, Victor Land, Chigo Okonkwo, and Idelfonso Tafur Monroy. "Quantum Data Encryption as a Service on Demand: Eindhoven QKD Network Testbed." In 2019 21st International Conference on Transparent Optical Networks (ICTON). IEEE, 2019. http://dx.doi.org/10.1109/icton.2019.8840238.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Hu, Ji, and Andreas Klein. "A Benchmark of Transparent Data Encryption for Migration of Web Applications in the Cloud." In 2009 International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE, 2009. http://dx.doi.org/10.1109/dasc.2009.85.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!