Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Database security.

Dissertationen zum Thema „Database security“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Database security" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Sakhi, Imal. „Database security in the cloud“. Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.

Der volle Inhalt der Quelle
Annotation:
The aim of the thesis is to get an overview of the database services available in cloud computing environment, investigate the security risks associated with it and propose the possible countermeasures to minimize the risks. The thesis also analyzes two cloud database service providers namely; Amazon RDS and Xeround. The reason behind choosing these two providers is because they are currently amongst the leading cloud database providers and both provide relational cloud databases which makes the comparison useful. The focus of the analysis has been to provide an overview of their database services as well as the available security measurements. A guide has been appended at the end of the report to help with technical configurations of database migration and connecting applications to the databases for the two mentioned cloud database providers. The thesis has been conducted on behalf of the Swedish Armed Forces and after reviewing the security risks associated with cloud databases, it is recommended that the Armed Forces should refrain from public cloud database services. Security deficiencies such as vague physical security and access control procedures, unavailability of preferred monitoring tools and most importantly the absence of proper encryption and key management schemes make the public database services useless for an authority such as the Armed Forces.  The recommended solutions are therefore to either use a jointly-owned community cloud database solution for less confidential data only or to use on-premise private cloud database solution for all but the TOP SECRET classified data.     Keywords: Cloud computing, cloud database services, Swedish Armed Forces, security risks, Xeround, Amazon RDS
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Chung, Sun S. „Anti-Tamper Databases: Querying Encrypted Databases“. online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Wong, Wai-kit, und 王偉傑. „Security and computability in database applications“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Kong, Yibing. „Security and privacy model for association databases“. Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hoeppner, Joseph A. „A Comparison of Cloud Computing Database Security Algorithms“. UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.

Der volle Inhalt der Quelle
Annotation:
The cloud database is a relatively new type of distributed database that allows companies and individuals to purchase computing time and memory from a vendor. This allows a user to only pay for the resources they use, which saves them both time and money. While the cloud in general can solve problems that have previously been too costly or time-intensive, it also opens the door to new security problems because of its distributed nature. Several approaches have been proposed to increase the security of cloud databases, though each seems to fall short in one area or another. This thesis presents the Hoeppner Security Algorithm (HSA) as a solution to these security problems. The HSA safeguards user’s data and metadata by adding fake records alongside the real records, breaking up the database by column or groups of columns, and by storing each group in a different cloud. The efficiency and security of this algorithm was compared to the Alzain algorithm (one of the proposed security solutions that inspired the HSA), and it was found that the HSA outperforms the Alzain algorithm in most every way.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Chen, Yu. „Protection of database security via collaborative inference detection“. Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Bernagozzi, Stefano. „Range Queries on an encrypted outsourced database“. Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.

Der volle Inhalt der Quelle
Annotation:
This project is about retrieving data in range without allowing the server to read it, when the database is stored in the server. Basically, our goal is to build a database that allows the client to maintain the confidentiality of the data stored, despite all the data is stored in a different location from the client's hard disk. This means that all the information written on the hard disk can be easily read by another person who can do anything with it. Given that, we need to encrypt that data from eavesdroppers or other people. This is because they could sell it or log into accounts and use them for stealing money or identities. In order to achieve this, we need to encrypt the data stored in the hard drive, so that only the possessor of the key can easily read the information stored, while all the others are going to read only encrypted data. Obviously, according to that, all the data management must be done by the client, otherwise any malicious person can easily retrieve it and use it for any malicious intention. All the methods analysed here relies on encrypting data in transit. In the end of this project we analyse 2 theoretical and practical methods for the creation of the above databases and then we tests them with 3 datasets and with 10, 100 and 1000 queries. The scope of this work is to retrieve a trend that can be useful for future works based on this project.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Pokorný, Tomáš. „Bezpečnostní aspekty implementace databázových systémů“. Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.

Der volle Inhalt der Quelle
Annotation:
The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database systems - Oracle, IBM DB2, Microsoft SQL Server, and PostgreSQL. Comparative criteria are based upon the list of requirements on database security and reflect specific attributes of the specific type of the data model. The comparison aims at utilization possibilities of each database product as well as its limitations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Ho, Sze-lok, und 何思樂. „Technical solutions for conducting investigations in digital age“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.

Der volle Inhalt der Quelle
Annotation:
Confidentiality has always been a concern in secret operation. In this thesis, we consider the situation of legitimate data request and transfer between investigator and database owner who provides intelligence, where the identity of the investigation subject and the records in the database are both confidential. Current practice of secret investigation solely relies on the integrity and carefulness of the involved individuals to resist data leakage, but regulations, policy, agreement, such human means cannot give a promising solution, thus a technical means is needed. As appropriate solution for this confidential data request and transfer problem cannot be found from related research, our goal is to offer a means that can help keeping the investigation secret and protecting irrelevant data at the same time. We present a technical solution for preserving two-way confidentiality between the investigator (legitimate data requester) and the database owner (legitimate data holder), which can accommodate the concerns of both sides during the specific information request and transfer. Two schemes, Sender-Based Scheme and Receiver-Based Scheme, have been proposed to solve the problem under different conditions, and illustration of executing our schemes is given through an example situation “Investigator and Private hospital” which is an ordinary scenario during investigation. Furthermore, a practical cost reduction methodology on the schemes and sensible proposals for extensions are suggested and discussed. The direction of future work is also considered.
published_or_final_version
Computer Science
Master
Master of Philosophy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zhang, Ye, und 张叶. „Query and access control over encrypted databases“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Pradhan, Sayli H. „User Interface Design, Database Connectivity, and Security in Fortified Cards“. Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10638557.

Der volle Inhalt der Quelle
Annotation:

The current debit and credit cards have inherent security flaws. The solution to this problem is the use of Fortified Cards, which differ from the credit or debit cards due to the embedded Quick Response (QR) code. With a combination of a user?s International Mobile Equipment Identity (IMEI) number and the QR code on the Fortified Card, any transaction can be performed in a more secure way, thereby reducing security frauds. In this report, three modules are explained, namely: User Interface (UI) design, database (backend) connectivity, and security. System Vision is used to explain the entire process of the transaction. The Android application uses the backend database in order to access and verify a user?s bank details. A few encryption algorithms were studied and Advanced Encryption Standard (AES) was chosen for implementation. The application was successful in transferring the transaction amount from the customer?s account to the vendor?s account.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Porter, Paul A. „Trust Negotiation for Open Database Access Control“. Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Neophytou, Andonis. „Computer security : data control and protection“. Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Der volle Inhalt der Quelle
Annotation:
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can alleviate the extent of the damage caused by those factors.The purpose of this study is to examine the different frameworks of computer security. Emphasis is given to data/database security and the various kinds of attacks on the data. Controls over these attacks and preventative measures will be discussed, and high level language programs will demonstrate the protection issues. The Oracle, SOL query language will be used to demonstrate these controls and prevention measures. In addition the FORTRAN high level language will be used in conjunction with SOL (Only the FORTRAN and COBOL compilers are available for embedded SOL). The C language will be used to show attacks on password files and also as an encryption/decryption program.This study was based mainly on research. An investigation of literature spanning the past decade, was examined to produce the ideas and methods of prevention and control discussed in the study.
Department of Computer Science
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Zhang, Xiao Meng M. Eng Massachusetts Institute of Technology. „Designing a SQL query rewriter to enforce database Row Level Security“. Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106398.

Der volle Inhalt der Quelle
Annotation:
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 73-74).
This thesis presents the design and implementation of Row Level Security, a fine-grained access control mechanism built on top of a database-agnostic data sharing platform called DataHub. Existing access control mechanisms for database systems are typically coarse-grained, in the sense that users are either given access to an entire database table or nothing at all. This is problematic with the rise in popularity of data sharing, where users want to share subsets of data in a table with others, rather than the entire table. Row Level Security addresses this problem by allowing users to create security policies that define subsets of data others are able to access, and enforces security policies through a query rewrite mechanism. This work presents Row Level Security, as well as an evaluation of its performance overhead costs and ease of use.
by Xiao Meng Zhang.
M. Eng.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Hong, Seng-Phil. „Data base security through simulation“. Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/902465.

Der volle Inhalt der Quelle
Annotation:
This research explores the complexities of database security, encompassing both the computer hardware and software. Also important is its nature as a people oriented issue. A risk analysis of a database system's security can be examined by creating a simulation model. Though, in order for it to be truly meaningful and accurate, all aspects of design, performance and procedure must be thoroughly and carefully scrutinized.Computer or data security is a major problem in today's world of data processing. This thesis outlines the security problem' and presents trends and issues. It also addresses current trends in computer security environments, database risk analysis, and simulations.Risk analysis is a technique used to quantitatively assess the relative value of protective measures. It is useful when appropriately applied and is in some cases required by regulatory agencies.The goal of security environments is to outline the framework which is valuable in assessing security issues and in establishing partitions in the overall environment within which this and other approaches to security can be examined.A simulation prototype is given which demonstrates the concepts of risk analysis for a database system.
Department of Computer Science
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Ofori-Duodu, Michael Samuel. „Exploring Data Security Management Strategies for Preventing Data Breaches“. ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.

Der volle Inhalt der Quelle
Annotation:
Insider threat continues to pose a risk to organizations, and in some cases, the country at large. Data breach events continue to show the insider threat risk has not subsided. This qualitative case study sought to explore the data security management strategies used by database and system administrators to prevent data breaches by malicious insiders. The study population consisted of database administrators and system administrators from a government contracting agency in the northeastern region of the United States. The general systems theory, developed by Von Bertalanffy, was used as the conceptual framework for the research study. The data collection process involved interviewing database and system administrators (n = 8), organizational documents and processes (n = 6), and direct observation of a training meeting (n = 3). By using methodological triangulation and by member checking with interviews and direct observation, efforts were taken to enhance the validity of the findings of this study. Through thematic analysis, 4 major themes emerged from the study: enforcement of organizational security policy through training, use of multifaceted identity and access management techniques, use of security frameworks, and use of strong technical control operations mechanisms. The findings of this study may benefit database and system administrators by enhancing their data security management strategies to prevent data breaches by malicious insiders. Enhanced data security management strategies may contribute to social change by protecting organizational and customer data from malicious insiders that could potentially lead to espionage, identity theft, trade secrets exposure, and cyber extortion.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Cui, Yingjie. „A study on privacy-preserving clustering“. Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B4357225X.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Pavlou, Kyriacos Eleftheriou. „Database Forensics in the Service of Information Accountability“. Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.

Der volle Inhalt der Quelle
Annotation:
Regulations and societal expectations have recently emphasized the need to mediate access to valuable databases, even by insiders. At one end of a spectrum is the approach of restricting access to information; at the other is information accountability. The focus of this work is on effecting information accountability of data stored in relational databases. One way to ensure appropriate use and thus end-to-end accountability of such information is through continuous assurance technology, via tamper detection in databases built upon cryptographic hashing. We show how to achieve information accountability by developing and refining the necessary approaches and ideas to support accountability in high-performance databases. These concepts include the design of a reference architecture for information accountability and several of its variants, the development of a sequence of successively more sophisticated forensic analysis algorithms and their forensic cost model, and a systematic formulation of forensic analysis for determining when the tampering occurred and what data were tampered with. We derive a lower bound for the forensic cost and prove that some of the algorithms are optimal under certain circumstances. We introduce a comprehensive taxonomy of the types of possible corruption events, along with an associated forensic analysis protocol that consolidates all extant forensic algorithms and the corresponding type(s) of corruption events they detect. Finally, we show how our information accountability solution can be used for databases residing in the cloud. In order to evaluate our ideas we design and implement an integrated tamper detection and forensic analysis system named DRAGOON. This work shows that information accountability is a viable alternative to information restriction for ensuring the correct storage, use, and maintenance of high-performance relational databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Aiello, Brady Benjamin. „Analyzing Global Cyber Attack Correlates Through an Open Database“. DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.

Der volle Inhalt der Quelle
Annotation:
As humanity becomes more reliant on digital storage and communication for every aspect of life, cyber attacks pose a growing threat. However, cyber attacks are generally understood as individual incidents reported in technological circles, sometimes tied to a particular vulnerability. They are not generally understood through the macroscopic lens of statistical analysis spanning years over several countries and sectors, leaving researchers largely ignorant of the larger trends and correlates between attacks. This is large part due to the lack of a coherent and open database of prominent attacks. Most data about cyber attacks has been captured using a repository of common vulnerabilities and exposures (CVE’s), and \honey pots", unsecured internet-connected devices which record attacks as they occur against them. These approaches help in the process of identifying vulnerabilities, but they do not capture the real world impact these attacks achieve. Therefore, in this thesis I create a database of 4,000 cyber attacks using a semi-open data source, and perform analytical queries on it to gather insights into how cyber attack volume varies among countries and sectors, and the correlates of cyber attack victims. From here, it is also possible to relate socio-economic data such as GDP and World Happiness Index to cyber attack volume. The end result is an open database of cyber attacks that allows researchers to understand the larger underlying forces which propel cyber attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Gaadingwe, Tshepo Gaadingwe. „A critical review of the IFIP TC11 Security Conference Series“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/507.

Der volle Inhalt der Quelle
Annotation:
Over the past few decades the field of computing has grown and evolved. In this time, information security research has experienced the same type of growth. The increase in importance and interest in information security research is reflected by the sheer number of research efforts being produced by different type of organizations around the world. One such organization is the International Federation for Information Processing (IFIP), more specifically the IFIP Technical Committee 11 (IFIP TC11). The IFIP TC11 community has had a rich history in producing high quality information security specific articles for over 20 years now. Therefore, IFIP TC11 found it necessary to reflect on this history, mainly to try and discover where it came from and where it may be going. Its 20th anniversary of its main conference presented an opportunity to begin such a study of its history. The core belief driving the study being that the future can only be realized and appreciated if the past is well understood. The main area of interest was to find out topics which may have had prevalence in the past or could be considered as "hot" topics. To achieve this, the author developed a systematic process for the study. The underpinning element being the creation of a classification scheme which was used to aid the analysis of the IFIP TC11 20 year's worth of articles. Major themes were identified and trends in the series highlighted. Further discussion and reflection on these trends were given. It was found that, not surprisingly, the series covered a wide variety of topics in the 20 years. However, it was discovered that there has been a notable move towards technically focused papers. Furthermore, topics such as business continuity had just about disappeared in the series while topics which are related to networking and cryptography continue to gain more prevalence.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Bai, Yun. „On formal specification of authorization policies and their transformations : thesis /“. View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.

Der volle Inhalt der Quelle
Annotation:
Thesis (Ph.D.)--University of Western Sydney, 2000.
"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Nguyen, Anthony. „Database system architecture for fault tolerance and disaster recovery“. [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:152.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Tao, Jia. „A model for storage and query of cascading beliefs in multilevel security database“. [Ames, Iowa : Iowa State University], 2006.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Bruner, William W. „National Security Implications of Inexpensive Space Access“. Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Raybourn, Tracey. „Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions“. Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Huber, Matthias Christoph [Verfasser], und J. [Akademischer Betreuer] Müller-Quade. „Provable and Practical Security for Database Outsourcing / Matthias Christoph Huber. Betreuer: J. Müller-Quade“. Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1113109289/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Reinsmith, Lee, und Steven Surber. „A PC Database and GUI for Telemetry Data Reduction“. International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608316.

Der volle Inhalt der Quelle
Annotation:
International Telemetering Conference Proceedings / October 25-28, 1999 / Riviera Hotel and Convention Center, Las Vegas, Nevada
The Telemetry Definition and Processing (TDAP II) application is a PC-based software tool that meets the varied needs - both now and into the 21st century - of instrumentation engineers, data analysts, test engineers, and project personnel in the Test and Evaluation (T&E) community. TDAP II uses state-of-the-art commercial software technology that includes a Microsoft Access 97Ô database and a Microsoft Visual BasicÔ Graphical User Interface (GUI) for users to view and navigate the database. Developed by the Test and Analysis Division of the 96th Communications Group for the tenants of the Air Armament Center (AAC), Eglin AFB Florida, TDAP II provides a centralized repository for both aircraft and weapons instrumentation descriptions and telemetry EU conversion calibrations. Operating in a client/server environment, TDAP II can be effectively used on a small or large network as well as on both a classified or unclassified Intranet or Internet. This paper describes the components and design of this application, along with its operational flexibility and varied uses resulting from the chosen commercial software technology.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Perry, Sonja Michele. „An integrated intranet and dynamic database application for the Security Manager at Naval Postgraduate School“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FPerry.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Randy L. Borchardt, Dan C. Boger. Includes bibliographical references (p. 67). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Shah, Rahul Arvind. „Vulnerability assessment of Java bytecode“. Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Cui, Yingjie, und 崔英杰. „A study on privacy-preserving clustering“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B4357225X.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Daehnick, Christian C. „Blueprints For The Future Comparing National Security Space Architectures /“. Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Wang, Shujing. „Logic programming based formal representations for authorization and security protocols“. Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.

Der volle Inhalt der Quelle
Annotation:
Logic programming with answer set semantics has been considered appealing rule-based formalism language and applied in information security areas. In this thesis, we investigate the problems of authorization in distributed environments and security protocol verification and update. Authorization decisions are required in large-scale distributed environments, such as electronic commerce, remote resource sharing, etc. We adopt the trust management approach, in which authorization is viewed as a ‘proof of compliance" problem. We develop an authorization language AL with non-monotonic feature as the policy and credential specification language, which can express delegation with depth control, complex subject structures, both positive and negative authorizations, and separation of duty concepts. The theoretical foundation for language AL is the answer set semantics of logic programming. We transform AL to logic programs and the authorization decisions are based on answer sets of the programs. We also explore the tractable subclasses of language AL. We implement a fine grained access control prototype system for XML resources, in which the language AL¤ simplified from AL is the policy and credential specification language. We define XPolicy, the XML format of AL¤, which is a DTD for the XML policy documents. The semantics of the policy is based on the semantics of language AL. The system is implemented using Java programming. We investigate the security protocol verification problem in provable security approach. Based on logic programming with answer set semantics, we develop a unified framework for security protocol verification and update, which integrates protocol specification, verification and update. The update model is defined using forgetting techniques in logic programming. Through a case study protocol, we demonstrate an application of our approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Kumka, David Harold. „Quantifying Performance Costs of Database Fine-Grained Access Control“. NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.

Der volle Inhalt der Quelle
Annotation:
Fine-grained access control is a conceptual approach to addressing database security requirements. In relational database management systems, fine-grained access control refers to access restrictions enforced at the row, column, or cell level. While a number of commercial implementations of database fine-grained access control are available, there are presently no generalized approaches to implementing fine-grained access control for relational database management systems. Fine-grained access control is potentially a good solution for database professionals and system architects charged with designing database applications that implement granular security or privacy protection features. However, in the oral tradition of the database community, fine-grained access control is spoken of as imposing significant performance penalties, and is therefore best avoided. Regardless, there are current and emerging social, legal, and economic forces that mandate the need for efficient fine-grained access control in relational database management systems. In the study undertaken, the author was able to quantify the performance costs associated with four common implementations of fine-grained access control for relational database management systems. Security benchmarking was employed as the methodology to quantify performance costs. Synthetic data from the TPC-W benchmark as well as representative data from a real-world application were utilized in the benchmarking process. A simple graph-base performance model for Fine-grained Access Control Evaluation (FACE) was developed from benchmark data collected during the study. The FACE model is intended for use in predicting throughput and response times for relational database management systems that implement fine-grained access control using one of the common fine-grained access control mechanisms - authorization views, the Hippocratic Database, label-based access control, and transparent query rewrite. The author also addresses the issue of scalability for fine-grained access control mechanisms that were evaluated in the study.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Poe, Gary A. „Privacy in Database Designs: A Role Based Approach“. Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.

Der volle Inhalt der Quelle
Annotation:
Privacy concerns have always been present in every society. The introduction of information technology information has enabled a reduction in the cost of gathering information, management of that information and the permitted that same information to become increasingly portable. Coupled with these reductions of cost has been an increase in the demand for information as well as the concern that privacy expectations be respected and enforced through security systems that safeguard access to private-type data. Security systems enforce privacy expectations. Unfortunately there is no consensus on a definition of privacy making the specification of security often over broad and resulting in the loss of critical functionality in the systems produced. This research expands the understanding of privacy by proposing a replicable type-based taxonomy of privacy that is grounded in philosophy and law. This type-based system is applied to a Role Based Access Control System to specify and control access to data in a in a hospital setting as a proof of concept.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Miller, William B. „Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems“. BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.

Der volle Inhalt der Quelle
Annotation:
In the past, there were perceived delineations between the cyber world and the physical world. We are becoming increasingly aware of the overlap between these two worlds, and the overlap itself is increasing. The overlap between these two worlds is known as cyber-physical systems. There have been several incidents involving cyber-physical systems and the number of these incidents is increasing dramatically. In the past there has been no effort to identify methods for describing these incidents in the unique context of cyber-physical systems. This research provides a taxonomy for classifying these incidents that focuses on cross domain, impact oriented analysis. A repository for information about these incidents has also been created as part of this research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Wang, Shujing. „Logic programming based formal representations for authorization and security protocols“. View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.

Der volle Inhalt der Quelle
Annotation:
Thesis (Ph.D.) -- University of Western Sydney, 2008.
A thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Maphakela, Madidimalo Rabbie. „A model for legal compliance in the South African banking sector : an information security perspective“. Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/725.

Der volle Inhalt der Quelle
Annotation:
In the past, many organisations used to keep their information on paper, which resulted in the loss of important information. In today’s knowledge era the information super-highway facilitates highly connected electronic environments where business applications can communicate on an intra- as well as inter-organizational level. As business expanded more into the cyber-world, so did the need to protect the information they have. Technology advances did not only bring benefits, it also increased the vulnerability of companies’ information. Information, the lifeblood of an organization, must be protected from threats such as hackers and fraud, amongst others. In the highly regulated financial sector, the protection of information is not only a best practice, but a legal obligation carrying penalties for non-compliance. From a positive aspect, organisations can identify security controls that can help them to secure their information, with the aid of legal sources. But organisations find themselves burdened by a burgeoning number of legal sources and requirements, which require vast resources and often become unmanageable. This research focuses on finding a solution for South African banks to comply with multiple legal sources, as seen from an information security perspective.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Lukanič, Michal. „Bezpečnost v databázi Oracle“. Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72438.

Der volle Inhalt der Quelle
Annotation:
The amount of electronically stored data is constantly growing. That's why we should consider the data security. Most electronic information is stored in the database. This thesis is concerned with ensuring data security in the Oracle database. First of all, I describe some of the available security surveys, to make it clear why we need to ensure the data security. In addition, I also describe the main aspects of information security. The aim is to introduce what we mean by security of information. Then I examine the recommendations of ISO 17799 standard, which is one of the sources for the measures described in the main part of this thesis. The next part is dedicated to finding the important security threats, which are used as a basis for following description of security tools. The aim of described recommendations and threats is to discover what is needed to ensure the data security. In the main part of this thesis I discuss the various security tools and procedures. The main objective of this thesis is the description of tools and procedures to ensure data security, following the recommendations of international standards and typical security threats. All described tools are part of the Oracle database. I place emphasis on the user access control.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Chmel, Marek. „Informační systém pro školící centrum“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222276.

Der volle Inhalt der Quelle
Annotation:
This thesis is aimed at the usage of PHP language and MySQL database system towards the creation of information system for a learning center. A deep analysis is performed before the design of an application together with the database structure, which is appropriate for the environment. An increased emphasis is laid on security and easy expansibility of the application in this analysis. Further on is described the design phase of the application and all the problems that came up. In the end of this work are listed possible extensions and improvements of this application.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Bai, Yun. „On formal specification of authorization policies and their transformations : thesis“. Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.

Der volle Inhalt der Quelle
Annotation:
Most of today's information systems are quite complex and often involve multi-user resource-sharing. In such a system, authorization policies are needed to ensure that the information flows in the desired way and to prevent illegal access to the system resource. Overall, authorization policies provide the ability to limit and control accesses to systems, applications and information. These policies need to be updated to capture the changing requirements of applications, systems and users. These updatings are implemented through the transformation of authorization policies. In this thesis, the author proposes a logic based formal approach to specifying authorization policies and to reason about the transformation and sequence of transformations of authorization policies and its application in object oriented databases. The author defines the structure of the policy transformation and employs model-based semantics to perform the transformation under the principle of minimum change. The language is modified to consider a sequence of authorization policy transformations. It handles more complex transformations and solves certain problems. The language is able to represent incomplete information, default authorizations and allows denials to be expressed explicitly. The proposed language is used to specify a variety of well known access control policies such as static separation of duty, dynamic separation of duty and Chinese wall security policy. The authorization formalization is also applied to object oriented databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Hermansson, Tobias. „FiLDB : An Architecture for Securely Connecting Databases to the Internet“. Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.

Der volle Inhalt der Quelle
Annotation:

Today more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.

There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.

The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Motara, Yusuf Moosa. „File integrity checking“. Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.

Der volle Inhalt der Quelle
Annotation:
This thesis looks at file execution as an attack vector that leads to the execution of unauthorized code. File integrity checking is examined as a means of removing this attack vector, and the design, implementation, and evaluation of a best-of-breed file integrity checker for the Linux operating system is undertaken. We conclude that the resultant file integrity checker does succeed in removing file execution as an attack vector, does so at a computational cost that is negligible, and displays innovative and useful features that are not currently found in any other Linux file integrity checker.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Kalakota, Govardhan Reddy. „Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System“. University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Naujokas, Tomas. „Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai“. Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944.

Der volle Inhalt der Quelle
Annotation:
Šio darbo tikslas buvo sukurti reikalavimais grindžiamą duomenų saugumo ir matomumo metodų pasirinkimo bei jų kombinavimo metodinę medžiagą. Pateikti reikalavimas grindžiamą kompleksinės saugos modelį. Pašalinti kompleksinės apsaugos metodų informacijos trūkumą. Darbe išnagrinėti ir palyginti garsių pasaulio saugos specialistų kompleksinės saugos sprendimai. Atlikta sistemos pažeidimų analizė ir sisteminimas. Darbe buvo siekiama atskleisti svarbiausius pažeidimus, jų veikimo principus ir kaip nuo jų tinkamai apsisaugoti. Praktinėje dalyje aprašytas kompleksinis saugos modelis, kuris vėliau smulkinamas į detalius apsaugos modelius. Modelis buvo pritaikytas šiandien populiariausiose kombinuotoje sistemose Microsoft Windows Server 2008 serveryje ir Microsoft SQL Server 2008 duomenų bazių valdymo sistemoje. Naudojantis metodika galima atlikti esamos sistemos saugumo analizę ir remiantis veiklos modeliais teisingai konfigūruoti esamą ar naujai kuriamą sistemą.
This work destination was to create requirements based on data security and availability method choosing and their combination methodology. Introduce requirements based on complex security model. Eliminate information lack of complex security. In work analyzed and compared complex security solutions of famous the word security specialists. Accomplished system vulnerability analysis and systematized information. During the work revealed most important vulnerabilities, explain how it works and how correctly secure of them. In this research described security model of complex security, which later detailed as smaller part of model. Complex security model were used at nowadays most popular combined information system. For research were used Microsoft Windows Server 2008 and Microsoft SQL Server 2008. Created methodology is useful then necessary to test existing or creating new configuration of system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Kalibjian, J. R. „Telemetry Post-Processing in the Clouds: A Data Security Challenge“. International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.

Der volle Inhalt der Quelle
Annotation:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada
As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Winner-Leoni, Melissa D. „An Investigation of the Security Designs of a Structured Query Language (SQL) Database and its Middleware Application and their Secure Implementation within Thinclient Environments“. [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/MWinnerLeoni2008.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Kalibjian, Jeff. „Data Security Architecture Considerations for Telemetry Post Processing Environments“. International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.

Der volle Inhalt der Quelle
Annotation:
Telemetry data has great value, as setting up a framework to collect and gather it involve significant costs. Further, the data itself has product diagnostic significance and may also have strategic national security importance if the product is defense or intelligence related. This potentially makes telemetry data a target for acquisition by hostile third parties. To mitigate this threat, data security principles should be employed by the organization to protect telemetry data. Data security is in an important element of a layered security strategy for the enterprise. The value proposition centers on the argument that if organization perimeter/internal defenses (e.g. firewall, IDS, etc.) fail enabling hostile entities to be able to access data found on internal company networks; they will be unable to read the data because it will be encrypted. After reviewing important encryption background including accepted practices, standards, and architectural considerations regarding disk, file, database and application data protection encryption strategies; specific data security options applicable to telemetry post processing environments will be discussed providing tangible approaches to better protect organization telemetry data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Subekti, Mohammad, und Widhya Bagya Prawiraatmadja. „A prototype database management system for the Budgeting System of the Department of Defense and security of the Republic of Indonesia“. Thesis, Monterey, California. Naval Postgraduate School, 1985. http://hdl.handle.net/10945/21512.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Brzobohatá, Veronika. „Vytvoření help desku SW nástroje pro řízení kybernetické bezpečnosti“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444576.

Der volle Inhalt der Quelle
Annotation:
The diploma thesis is focused on the creation of a helpdesk design for ESKO software. This ESKO software was developed by ISIT Slovakia s.r.o. The helpdesk will be represented by several software. Some are used to create diagrams and represent workflows, others for graphic editing. The helpdesk will be created based on the current needs of the company and then delivered to it as the final product. The main goal is to extend the functionality of an existing website and add to this website and the proposed helpdesk. The bonus will be a query library, which should work on the principle of an SQL database.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Miklau, Gerome. „Confidentiality and integrity in distributed data exchange /“. Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie