Dissertationen zum Thema „Database security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Database security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Sakhi, Imal. „Database security in the cloud“. Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Der volle Inhalt der QuelleChung, Sun S. „Anti-Tamper Databases: Querying Encrypted Databases“. online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Der volle Inhalt der QuelleWong, Wai-kit, und 王偉傑. „Security and computability in database applications“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Der volle Inhalt der QuelleKong, Yibing. „Security and privacy model for association databases“. Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Der volle Inhalt der QuelleHoeppner, Joseph A. „A Comparison of Cloud Computing Database Security Algorithms“. UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Der volle Inhalt der QuelleChen, Yu. „Protection of database security via collaborative inference detection“. Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Der volle Inhalt der QuelleBernagozzi, Stefano. „Range Queries on an encrypted outsourced database“. Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Der volle Inhalt der QuellePokorný, Tomáš. „Bezpečnostní aspekty implementace databázových systémů“. Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Der volle Inhalt der QuelleHo, Sze-lok, und 何思樂. „Technical solutions for conducting investigations in digital age“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Der volle Inhalt der Quellepublished_or_final_version
Computer Science
Master
Master of Philosophy
Zhang, Ye, und 张叶. „Query and access control over encrypted databases“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Der volle Inhalt der QuellePradhan, Sayli H. „User Interface Design, Database Connectivity, and Security in Fortified Cards“. Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10638557.
Der volle Inhalt der QuelleThe current debit and credit cards have inherent security flaws. The solution to this problem is the use of Fortified Cards, which differ from the credit or debit cards due to the embedded Quick Response (QR) code. With a combination of a user?s International Mobile Equipment Identity (IMEI) number and the QR code on the Fortified Card, any transaction can be performed in a more secure way, thereby reducing security frauds. In this report, three modules are explained, namely: User Interface (UI) design, database (backend) connectivity, and security. System Vision is used to explain the entire process of the transaction. The Android application uses the backend database in order to access and verify a user?s bank details. A few encryption algorithms were studied and Advanced Encryption Standard (AES) was chosen for implementation. The application was successful in transferring the transaction amount from the customer?s account to the vendor?s account.
Porter, Paul A. „Trust Negotiation for Open Database Access Control“. Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Der volle Inhalt der QuelleNeophytou, Andonis. „Computer security : data control and protection“. Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Der volle Inhalt der QuelleDepartment of Computer Science
Zhang, Xiao Meng M. Eng Massachusetts Institute of Technology. „Designing a SQL query rewriter to enforce database Row Level Security“. Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106398.
Der volle Inhalt der QuelleThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 73-74).
This thesis presents the design and implementation of Row Level Security, a fine-grained access control mechanism built on top of a database-agnostic data sharing platform called DataHub. Existing access control mechanisms for database systems are typically coarse-grained, in the sense that users are either given access to an entire database table or nothing at all. This is problematic with the rise in popularity of data sharing, where users want to share subsets of data in a table with others, rather than the entire table. Row Level Security addresses this problem by allowing users to create security policies that define subsets of data others are able to access, and enforces security policies through a query rewrite mechanism. This work presents Row Level Security, as well as an evaluation of its performance overhead costs and ease of use.
by Xiao Meng Zhang.
M. Eng.
Hong, Seng-Phil. „Data base security through simulation“. Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/902465.
Der volle Inhalt der QuelleDepartment of Computer Science
Ofori-Duodu, Michael Samuel. „Exploring Data Security Management Strategies for Preventing Data Breaches“. ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Der volle Inhalt der QuelleCui, Yingjie. „A study on privacy-preserving clustering“. Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B4357225X.
Der volle Inhalt der QuellePavlou, Kyriacos Eleftheriou. „Database Forensics in the Service of Information Accountability“. Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.
Der volle Inhalt der QuelleAiello, Brady Benjamin. „Analyzing Global Cyber Attack Correlates Through an Open Database“. DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.
Der volle Inhalt der QuelleGaadingwe, Tshepo Gaadingwe. „A critical review of the IFIP TC11 Security Conference Series“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/507.
Der volle Inhalt der QuelleBai, Yun. „On formal specification of authorization policies and their transformations : thesis /“. View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Der volle Inhalt der Quelle"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
Nguyen, Anthony. „Database system architecture for fault tolerance and disaster recovery“. [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:152.
Der volle Inhalt der QuelleTao, Jia. „A model for storage and query of cascading beliefs in multilevel security database“. [Ames, Iowa : Iowa State University], 2006.
Den vollen Inhalt der Quelle findenBruner, William W. „National Security Implications of Inexpensive Space Access“. Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Der volle Inhalt der QuelleRaybourn, Tracey. „Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions“. Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.
Der volle Inhalt der QuelleHuber, Matthias Christoph [Verfasser], und J. [Akademischer Betreuer] Müller-Quade. „Provable and Practical Security for Database Outsourcing / Matthias Christoph Huber. Betreuer: J. Müller-Quade“. Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1113109289/34.
Der volle Inhalt der QuelleReinsmith, Lee, und Steven Surber. „A PC Database and GUI for Telemetry Data Reduction“. International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608316.
Der volle Inhalt der QuelleThe Telemetry Definition and Processing (TDAP II) application is a PC-based software tool that meets the varied needs - both now and into the 21st century - of instrumentation engineers, data analysts, test engineers, and project personnel in the Test and Evaluation (T&E) community. TDAP II uses state-of-the-art commercial software technology that includes a Microsoft Access 97Ô database and a Microsoft Visual BasicÔ Graphical User Interface (GUI) for users to view and navigate the database. Developed by the Test and Analysis Division of the 96th Communications Group for the tenants of the Air Armament Center (AAC), Eglin AFB Florida, TDAP II provides a centralized repository for both aircraft and weapons instrumentation descriptions and telemetry EU conversion calibrations. Operating in a client/server environment, TDAP II can be effectively used on a small or large network as well as on both a classified or unclassified Intranet or Internet. This paper describes the components and design of this application, along with its operational flexibility and varied uses resulting from the chosen commercial software technology.
Perry, Sonja Michele. „An integrated intranet and dynamic database application for the Security Manager at Naval Postgraduate School“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FPerry.pdf.
Der volle Inhalt der QuelleThesis advisor(s): Randy L. Borchardt, Dan C. Boger. Includes bibliographical references (p. 67). Also available online.
Shah, Rahul Arvind. „Vulnerability assessment of Java bytecode“. Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.
Der volle Inhalt der QuelleCui, Yingjie, und 崔英杰. „A study on privacy-preserving clustering“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B4357225X.
Der volle Inhalt der QuelleDaehnick, Christian C. „Blueprints For The Future Comparing National Security Space Architectures /“. Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Der volle Inhalt der QuelleWang, Shujing. „Logic programming based formal representations for authorization and security protocols“. Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Der volle Inhalt der QuelleKumka, David Harold. „Quantifying Performance Costs of Database Fine-Grained Access Control“. NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.
Der volle Inhalt der QuellePoe, Gary A. „Privacy in Database Designs: A Role Based Approach“. Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Der volle Inhalt der QuelleMiller, William B. „Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems“. BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.
Der volle Inhalt der QuelleWang, Shujing. „Logic programming based formal representations for authorization and security protocols“. View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Der volle Inhalt der QuelleA thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
Maphakela, Madidimalo Rabbie. „A model for legal compliance in the South African banking sector : an information security perspective“. Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/725.
Der volle Inhalt der QuelleLukanič, Michal. „Bezpečnost v databázi Oracle“. Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72438.
Der volle Inhalt der QuelleChmel, Marek. „Informační systém pro školící centrum“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222276.
Der volle Inhalt der QuelleBai, Yun. „On formal specification of authorization policies and their transformations : thesis“. Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Der volle Inhalt der QuelleHermansson, Tobias. „FiLDB : An Architecture for Securely Connecting Databases to the Internet“. Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Der volle Inhalt der QuelleToday more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.
There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.
The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.
Motara, Yusuf Moosa. „File integrity checking“. Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.
Der volle Inhalt der QuelleKalakota, Govardhan Reddy. „Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System“. University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.
Der volle Inhalt der QuelleNaujokas, Tomas. „Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai“. Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944.
Der volle Inhalt der QuelleThis work destination was to create requirements based on data security and availability method choosing and their combination methodology. Introduce requirements based on complex security model. Eliminate information lack of complex security. In work analyzed and compared complex security solutions of famous the word security specialists. Accomplished system vulnerability analysis and systematized information. During the work revealed most important vulnerabilities, explain how it works and how correctly secure of them. In this research described security model of complex security, which later detailed as smaller part of model. Complex security model were used at nowadays most popular combined information system. For research were used Microsoft Windows Server 2008 and Microsoft SQL Server 2008. Created methodology is useful then necessary to test existing or creating new configuration of system.
Kalibjian, J. R. „Telemetry Post-Processing in the Clouds: A Data Security Challenge“. International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Der volle Inhalt der QuelleAs organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Winner-Leoni, Melissa D. „An Investigation of the Security Designs of a Structured Query Language (SQL) Database and its Middleware Application and their Secure Implementation within Thinclient Environments“. [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/MWinnerLeoni2008.pdf.
Der volle Inhalt der QuelleKalibjian, Jeff. „Data Security Architecture Considerations for Telemetry Post Processing Environments“. International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.
Der volle Inhalt der QuelleSubekti, Mohammad, und Widhya Bagya Prawiraatmadja. „A prototype database management system for the Budgeting System of the Department of Defense and security of the Republic of Indonesia“. Thesis, Monterey, California. Naval Postgraduate School, 1985. http://hdl.handle.net/10945/21512.
Der volle Inhalt der QuelleBrzobohatá, Veronika. „Vytvoření help desku SW nástroje pro řízení kybernetické bezpečnosti“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444576.
Der volle Inhalt der QuelleMiklau, Gerome. „Confidentiality and integrity in distributed data exchange /“. Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.
Der volle Inhalt der Quelle