Zeitschriftenartikel zum Thema „Databases security“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Databases security.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Databases security" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar und Supriya N. Deshpande. „Database Security“. International Journal for Research in Applied Science and Engineering Technology 11, Nr. 4 (30.04.2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Der volle Inhalt der Quelle
Annotation:
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privilege, regularly updating and patching DBMS, conducting regular security audits, providing user awareness training, implementing data encryption, monitoring and logging database activities, developing an incident response plan, staying updated with the latest research and best practices, and continuously improving security measures. By following this methodology, organizations can effectively enhance the security of their databases and safeguard critical data from potential attacks and breaches. Emphasis is placed on regular review and updates to security measures to proactively address evolving threats and ensure continuous protection of sensitive data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ahmad, Khaleel, Mohammad Shoaib Alam und Nur Izura Udzir. „Security of NoSQL Database Against Intruders“. Recent Patents on Engineering 13, Nr. 1 (08.02.2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.

Der volle Inhalt der Quelle
Annotation:
Background: The evolution of distributed web-based applications and cloud computing has brought about the demand to store a large amount of big data in distributed databases. Such efficient systems offer excessive availability and scalability to users. The new type of database resolves many new challenges especially in large-scale and high concurrency applications which are not present in the relational database. NoSQL refers to non-relational databases that are different from the Relational Database Management System. Objective: NoSQL has many features over traditional databases such as high scalability, distributed computing, lower cost, schema flexibility, semi or un-semi structural data and no complex relationship. Method: NoSQL databases are “BASE” Systems. The BASE (Basically Available, Soft state, Eventual consistency), formulates the CAP theorem the properties of which are used by BASE System. The distributed computer system cannot guarantee all of the following three properties at the same time that is consistency, availability and partition tolerance. Results: As progressively sharp big data is saved in NoSQL databases, it is essential to preserve higher security measures to ensure safe and trusted communication across the network. In this patent, we describe the security of NoSQL database against intruders which is growing rapidly. Conclusion: This patent also defines probably the most prominent NoSQL databases and describes their security aspects and problems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Lysetskyi, Yu M., und D. Y. Kalbazov. „Information security of corporate databases“. Mathematical machines and systems 3 (2023): 31–37. http://dx.doi.org/10.34121/1028-9763-2023-3-31-37.

Der volle Inhalt der Quelle
Annotation:
Every day, companies all over the world collect and generate a large amount of data. Now in-formation is digital and is stored in automated digital databases, the use of which allows for processing large amounts of data that previously were difficult to process. Protecting corporate databases and the information within them is essential for economic security. It includes their physical protection, productivity assurance and monitoring, data protection from destruction or damage, access control, and recording of new databases appearing in the infrastructure. Howev-er, since users of different types and levels of access (internal users, system administrators, contractors, partners, and M2M communications) have access to databases, they can abuse their access rights in several ways. These may be an abuse of excessive, objectively necessary, or non-used rights. As a rule, an inefficiently controlled process of granting access rights creates excessive access rights which in turn may cause new information security risks. Security measures include implementing an access management process, granting minimally necessary access rights, and implementing a mechanism to control and block the given access rights. This article discusses such threats to databases as SQL Injections and NoSQL injection attacks, in-sufficient detailing of events in databases, backup leaks, vulnerabilities and configurations, DDoS attacks, and methods to counter these threats. The most effective way to protect data-bases is to implement specialized software and hardware complexes such as Imperva DBS and Imperva WAF developed for database protection. The use of Imperva DBS will help to solve all the key tasks of database protection and provide complete visibility and control over their usage in the enterprise infrastructure.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Haikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan und Hamdani Arif. „Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33“. Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, Nr. 2 (18.06.2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.

Der volle Inhalt der Quelle
Annotation:
The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve the security of their databases and protect sensitive information. These research findings demonstrate that enabling SSL encryption leads to longer average execution times for database operations. This latency can be attributed to the computational workload associated with SSL's encryption and decryption processes. However, the trade-off between performance and security is essential to safeguarding data in transit.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kyrychenko, I. V., О. S. Nazarov, I. V. Gruzdo und N. Kozel. „SECURITY IN DECENTRALIZED DATABASES“. Bionics of Intelligence 1, Nr. 92 (02.06.2019): 59–64. http://dx.doi.org/10.30837/bi.2019.1(92).10.

Der volle Inhalt der Quelle
Annotation:
Blockchain is a distributed network that records digital transactions on a publicly accessible ledger. This paper explores whether blockchain technology is a suitable platform for the preservation of digital signatures and public/ private key pairs. Conventional infrastructures use digital certificates, issued by certification authorities, to declare the authentication of key pairs and digital signatures. This paper suggests that the blockchain’s hash functions offer a better strategy for signature preservation than digital certificates. Compared to digital certificates, hashing provides better privacy and security. It is a form of authentication that does not require trust in a third-party authority, and the distributed nature of the blockchain network removes the problem of a single point of failure.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Neto, Afonso Araújo, und Marco Vieira. „Security Gaps in Databases“. International Journal of Secure Software Engineering 2, Nr. 3 (Juli 2011): 42–62. http://dx.doi.org/10.4018/jsse.2011070103.

Der volle Inhalt der Quelle
Annotation:
When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecting the adequate package for a given installation quite hard. This paper proposes a methodology for detecting database security gaps. This methodology is based on a comprehensive list of security mechanisms (derived from widely accepted security best practices), which was used to perform a gap analysis of the security features of seven software packages composed by widely used products, including four DBMS engines and two Operating Systems (OS). The goal is to understand how much each software package helps developers and administrators to actually accomplish the security tasks that are expected from them. Results show that while there is a common set of security mechanisms that is implemented by most packages, there is another set of security tasks that have no support at all in any of the packages.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Pernul, G., und A. M. Tjoa. „Security Policies for Databases“. IFAC Proceedings Volumes 25, Nr. 30 (Oktober 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Thuraisingham, Bhavani. „Security for Distributed Databases“. Information Security Technical Report 6, Nr. 2 (Juni 2001): 95–102. http://dx.doi.org/10.1016/s1363-4127(01)00210-2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Teimoor, Ramyar Abdulrahman. „A Review of Database Security Concepts, Risks, and Problems“. UHD Journal of Science and Technology 5, Nr. 2 (10.10.2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.

Der volle Inhalt der Quelle
Annotation:
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Arputharaj J, Vijay, und Dr R. Manicka Chezian. „A Collective Algorithmic ApproachFor Enhanced DNA Database Security“. INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, Nr. 1 (30.06.2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.

Der volle Inhalt der Quelle
Annotation:
The proposed method is a mixture of several security methods namely digital authentication tag along with the data mining in the DNA database. Data mining in the area of human genetics, an important goal is to understand the mapping relationship between the individual variation in human DNA sequences and variability in various algorithms for database security issues, for mutation susceptibility and parental identification differences. This paper primarily deals with the advancement of genetic algorithm with proper security features in DNA Databases and it enhances the special features in DNA database security. Several security methods include encryption algorithms, higher, not as much of multifaceted with trouble-free to apply in DNA Databases, used for protected database. The Reverse Encryption algorithm to protect data,Advance Cryptography algorithm to resist data, also Advanced Encryption Standard (AES) is most preferable for security in DNA databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Vishwakarma, Jaychand, und Abhishek Shukla. „Survey on Security Issues and Their Techniques in DBMS“. International Journal of Advanced Research in Computer Science and Software Engineering 8, Nr. 1 (30.01.2018): 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.

Der volle Inhalt der Quelle
Annotation:
Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Mamta Rani. „Database security at cache layer“. International Journal of Science and Research Archive 9, Nr. 2 (30.07.2023): 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.

Der volle Inhalt der Quelle
Annotation:
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today database security is getting greater importance than the past which is the amount of data is stored in a corporate database is increasing. People are depending more on the corporate data for making a decision, management of customer service and supply chain management etc. Data stored in databases is usually very vulnerable data so it becomes very important and crucial to maintain this data securely. There are many front end applications that fetch data from secondary storage to main memory for processing and from main memory, data is stored in cache for temporary processing. Any loss or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data. In this paper, I present a model where data is protected even on cache layer.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Gudriks, Rinalds, und Sergejs Kodors. „POSTGRESQL DATABASES SECURITY CONFIGURATION CHECKLIST“. HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, Nr. 23 (24.04.2019): 38. http://dx.doi.org/10.17770/het2019.23.4386.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Yerkey, A. Neil. „Security of Microsoft Access Databases“. Library & Archival Security 17, Nr. 2 (März 2001): 29–43. http://dx.doi.org/10.1300/j114v17n02_04.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Henley, Stephen. „Project databases: standards and security“. Geological Society, London, Special Publications 97, Nr. 1 (1995): 97–101. http://dx.doi.org/10.1144/gsl.sp.1995.097.01.12.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Lipton, J. D. „Security Interests in Electronic Databases“. International Journal of Law and Information Technology 9, Nr. 1 (01.03.2001): 65–86. http://dx.doi.org/10.1093/ijlit/9.1.65.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Ahlswede, R., und H. Aydinian. „On Security of Statistical Databases“. SIAM Journal on Discrete Mathematics 25, Nr. 4 (Januar 2011): 1778–91. http://dx.doi.org/10.1137/070689589.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Laferriere, Claude, G. Owen Higginson und Gordon G. Bell. „Security architectures for textual databases“. Computers & Security 9, Nr. 7 (November 1990): 621–30. http://dx.doi.org/10.1016/0167-4048(90)90061-w.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Hashim, Hassan Bediar. „Challenges and Security Vulnerabilities to Impact on Database Systems“. Al-Mustansiriyah Journal of Science 29, Nr. 2 (17.11.2018): 117. http://dx.doi.org/10.23851/mjs.v29i2.332.

Der volle Inhalt der Quelle
Annotation:
Abstract A lot of institutions depends at present on the systems database operations and their daily activities, thus providing a means for the maintenance of permanent data can refer to it at any time, as well as to search and to modify the data easily. in this paper to determine the security challenges in the databases, and requirements necessary to address those challenges in the data value to provide security base, and to determine the security rules and know the weaknesses that can be exploited any information in a manner not allowed, when he must protect the database to make sure of the following purposes: confidentiality, integrity and continuity. One of the solutions used in this research to protect databases, and encryption of sensitive data, and adjust the system databases, and updates the database systems and we review some of the ways to address these challenges in the security databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

ITAI, YAYA, AWODELE OLUDELE PhD und NICOLAE GOGA PhD. „Trigger and Database Security“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, Nr. 1 (01.02.2013): 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.

Der volle Inhalt der Quelle
Annotation:
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

P.J, Sankaranarayanan, und Geogen George. „Blockchain Based Aadhaar Security“. International Journal of Engineering & Technology 7, Nr. 4.6 (25.09.2018): 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.

Der volle Inhalt der Quelle
Annotation:
A blockchain is a decentralized, disseminated and digital ledger that can’t be altered retroactively without modifying every single blocks and the consensus of the network. Blockchain can be used in smart contracts, Banks, IoT devices, Database management, etc., Due to recent times flaws and leakage of Aadhaar information (Aadhaar which is the largest government databases of the Indian citizens) in Internet the security and privacy of Aadhaar became questionable. In order to ensure the security of Aadhaar, Blockchain has the potential to overcome security and privacy challenges in Aadhaar. In this project we are going to create a Blockchain for Aadhaar database and implement light weight algorithm for efficiency, optimization and scalability along with the Blockchain securing algorithm.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

S R V Satish, Karuturi. „Database Security Issues and Challenges in Cloud Computing“. International Journal on Recent and Innovation Trends in Computing and Communication 11, Nr. 11 (05.04.2024): 937–43. http://dx.doi.org/10.17762/ijritcc.v11i11.10396.

Der volle Inhalt der Quelle
Annotation:
The majority of enterprises have recently enthusiastically embraced cloud computing, and at the same time, the database has moved to the cloud. This cloud database paradigm can lower data administration expenses and free up new business to concentrate on the product that is being delivered. Furthermore, issues with scalability, flexibility, performance, availability, and affordability can be resolved with cloud computing. Security, however, has been noted as posing a serious risk to cloud databases and has been essential in fostering public acceptance of cloud computing. Several security factors should be taken into account before implementing any cloud database management system. These features comprise, but are not restricted to, data privacy, data isolation, data availability, data integrity, confidentiality, and defense against insider threats. In this paper, we discuss the most recent research that took into account the security risks and problems associated with adopting cloud databases. In order to better comprehend these problems and how they affect cloud databases, we also provide a conceptual model. Additionally, we look into these problems to the extent that they are relevant and provide two instances of vendors and security features that were used for cloud-based databases. Finally, we provide an overview of the security risks associated with open cloud databases and suggest possible future paths.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Mocean, Loredana, und Miranda-Petronella Vlad. „Database Security in RDF Terms“. Scientific Bulletin 28, Nr. 1 (01.06.2023): 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.

Der volle Inhalt der Quelle
Annotation:
Abstract Databases are perhaps the most attacked and vulnerable elements in the online environment as far as organizations are concerned. The databases contain the most important information of an organization and its confidential data, along with those of its customers. However, little of the effort dedicated to security is intended to protect data. The present paper draws attention to the need to implement a simple and then complex security in a database using RDF (Resource Description Framework) based descriptions. Our example is one implemented for Microsoft Access and covers different security level descriptions considering attack types. We choose to represent the basic concepts and abstract syntax using the RDF data modeling vocabulary and we’re using as a starting point a legacy relational database where the company already catalogued attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

NICA, ELVIRA, BOGDAN GEORGE TUDORICA, DOREL-MIHAIL DUSMANESCU, GHEORGHE POPESCU und ALINA MARIA BREAZ. „Databases Security Issues - A Short Analysis on the Emergent Security Problems Generated By NoSQL Databases“. ECONOMIC COMPUTATION AND ECONOMIC CYBERNETICS STUDIES AND RESEARCH 53, Nr. 3/2019 (21.09.2019): 113–29. http://dx.doi.org/10.24818/18423264/53.3.19.07.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Chen, Ailin, Shaoyuan Yu, Xinyi Yang, Ding Huang und Yongjun Ren. „IoT data security in outsourced databases: A survey of verifiable database“. Heliyon 10, Nr. 7 (April 2024): e28117. http://dx.doi.org/10.1016/j.heliyon.2024.e28117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Stenin, Dmitriy, Natalya Stenina, Arman Akanov und Kakim Sagindikov. „Digitalization and Innovative Development of Mining Processes“. E3S Web of Conferences 105 (2019): 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.

Der volle Inhalt der Quelle
Annotation:
This article discusses the issues of digitalization and using of information technologies, and in particular databases at all stages of the technological process of mining. In addition, the paper proposes options for protection against some of the possible attacks and information protection using countermeasures and control methods that exist at the present time. Database security is an important approach for planning and decision-making clear the security requirements of the database. Database security, especially for an industry such as mining, is a very important issue for companies. With increasing complexity of the databases, we may encounter with more complex problems related to information security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza, Ashwaq A. Alotaibi, Reem M. Alotaibi and Nermin Hamza. „Access Control Models in NoSQL Databases: An Overview“. journal of king abdulaziz university computing and information technology sciences 8, Nr. 1 (10.03.2019): 1–9. http://dx.doi.org/10.4197/comp.8-1.1.

Der volle Inhalt der Quelle
Annotation:
Recently non-relational databases known as NoSQL have become most popular for handling a huge amount of data. Many organizations move from relational databases towards NoSQL databases due to the growing popularity of cloud computing and big data. NoSQL database is designed to handle unstructured data like documents, e-mails, and social media efficiently. It uses distributed and cooperating devices to store and retrieve data. As a large number of people storing sensitive data in NoSQL databases, security issues become critical concerns. NoSQL has many advantages like scalability and availability, but it suffers from some security issues like weak authorization mechanisms. This paper reviews the different models of NoSQL databases and the security issues concerning these databases. In addition, we present the existing access control models in different NoSQL databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Alshammari, Bandar M. „Security Assessment Model for Database Relational Designs“. Journal of Medical Imaging and Health Informatics 9, Nr. 6 (01.08.2019): 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.

Der volle Inhalt der Quelle
Annotation:
The increasing number of data breaches has led many organizations to focus on securing their IT infrastructures and application architectures. However, the main causes of many of the latest attacks are not associated with these two architectures. The damage caused by most of the recent attacks could have been minimized if more attention was given to enhancing the security of all components of the database architecture. The existing enterprise database architecture frameworks do not consider this issue a priority; hence, it has received minimal attention. The enterprise database architecture is the most important architecture because it is responsible for defining how all types of data, whether security-critical or not, are stored and accessed. This paper focuses on addressing the lack of a complete solution to help enterprise system architects to address the security of their organizations from early stages. The novelty of this approach is that it specifies how to modify the required artifacts by the enterprise database architecture to address security-critical data. The approach also defines a number of security measurements that help enterprise architects in measuring the security of the organization database based on those artifacts. These metrics are developed based on the results of a cybersecurity experiment conducted on 100 randomly selected open-source websites. The paper's contributions also consist of the definition of a number of security refactoring rules that specify how to modify current enterprise databases to make them more secure. This paper uses an existing relational diagram for a health clinic database to illustrate the application of the model to an existing database. The validity and applicability of these metrics and refactoring rules are proved using an experiment conducted on a number of security-related databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Agarwal, Archita, Maurice Herlihy, Seny Kamara und Tarik Moataz. „Encrypted Databases for Differential Privacy“. Proceedings on Privacy Enhancing Technologies 2019, Nr. 3 (01.07.2019): 170–90. http://dx.doi.org/10.2478/popets-2019-0042.

Der volle Inhalt der Quelle
Annotation:
Abstract The problem of privatizing statistical databases is a well-studied topic that has culminated with the notion of differential privacy. The complementary problem of securing these differentially private databases, however, has—as far as we know—not been considered in the past. While the security of private databases is in theory orthogonal to the problem of private statistical analysis (e.g., in the central model of differential privacy the curator is trusted) the recent real-world deployments of differentially-private systems suggest that it will become a problem of increasing importance. In this work, we consider the problem of designing encrypted databases (EDB) that support differentially-private statistical queries. More precisely, these EDBs should support a set of encrypted operations with which a curator can securely query and manage its data, and a set of private operations with which an analyst can privately analyze the data. Using such an EDB, a curator can securely outsource its database to an untrusted server (e.g., on-premise or in the cloud) while still allowing an analyst to privately query it. We show how to design an EDB that supports private histogram queries. As a building block, we introduce a differentially-private encrypted counter based on the binary mechanism of Chan et al. (ICALP, 2010). We then carefully combine multiple instances of this counter with a standard encrypted database scheme to support differentially-private histogram queries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Yesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura und Stanislaw A. Rajba. „Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model“. Applied Sciences 11, Nr. 23 (25.11.2021): 11175. http://dx.doi.org/10.3390/app112311175.

Der volle Inhalt der Quelle
Annotation:
Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured. To solve this challenge, the authors of the paper enhanced the Clements–Hoffman model, determined the integral security metric and, on this basis, developed a technique for evaluating the security of relational databases. The essence of improving the Clements–Hoffmann model is to expand it by including a set of object vulnerabilities. Vulnerability is considered as a separate objectively existing category. This makes it possible to evaluate both the likelihood of an unwanted incident and the database security as a whole more adequately. The technique for evaluating the main components of the security barriers and the database security as a whole, proposed by the authors, is based on the theory of fuzzy sets and risk. As an integral metric of database security, the reciprocal of the total residual risk is used, the constituent components of which are presented in the form of certain linguistic variables. In accordance with the developed technique, the authors presented the results of a quantitative evaluation of the effectiveness of the protection of databases built on the basis of the schema with the universal basis of relations and designed in accordance with the traditional technology of relational databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Alshammari, Ahmad. „Structuring and organizing database security domain from big data perspective using meta-modeling approach“. International Journal of ADVANCED AND APPLIED SCIENCES 11, Nr. 2 (Februar 2024): 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.

Der volle Inhalt der Quelle
Annotation:
Database security is an area focused on safeguarding databases against harmful access. It involves ensuring data accuracy, blocking unauthorized entry, and preventing harmful code within the database. Although various security models and methods exist, they often don't comprehensively cover all aspects of database security. This leads to a diverse and unclear understanding of database security among experts. This study proposes a unified framework, the Database Security Meta-model (DBSM), which acts as a standard language in this field. The DBSM, comprising twelve main elements, is thoroughly vetted to align with security needs and offers guidelines for practitioners to create specific security solutions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Vilihura, Vladislav, Yuriy Gorbenko, Vitaliy Yesin und Serhiy Rassomakhin. „Using formal security models in secure databases“. Physico-mathematical modelling and informational technologies, Nr. 32 (07.07.2021): 70–74. http://dx.doi.org/10.15407/fmmit2021.32.070.

Der volle Inhalt der Quelle
Annotation:
The paper contains key provisions (requirements) that should be followed when building secure databases using the capabilities of the main formal access control models, such as discretionary access control models, mandatory access control models, role-based access control models. At the same time, it is noted that any security model does not provide protection but only provides the principle of building a secure database, the implementation of which should ensure the security properties inherent in the model. The security of the database is equally determined by: the properties of the model itself (one or more), its (their) adequacy to the threats affecting the system, and how it (they) is correctly implemented(s). The decisive factor in making a decision is always an assessment of a specific situation, which will allow you to make the right choice, including the complex use of formal models.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Dempsey, B. J., und J. Herrin. „WEB-Enabled Medical Databases: a Threat to Security?“ Methods of Information in Medicine 39, Nr. 04/05 (2000): 298–302. http://dx.doi.org/10.1055/s-0038-1634448.

Der volle Inhalt der Quelle
Annotation:
Abstract:An increasing number of clinical databases are being adapted to allow access through Internet protocols, particularly Hypertext Transfer Protocol (HTTP). The World Wide Web (WWW) provides a user-friendly, standardized, broadly distributed database interface; at the same time, it may also present a threat to the security and confidentiality of patient data. However, there is little empirical evidence concerning such threats. Using publicly available records we estimate the additional risk of security violations due to web-enabling a database. The evidence, though limited, suggests that the additional risk may be small relative to more traditional security threats.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Jamali, Mujeeb-ur-Rehman, Najma Imtiaz Ali, Imtiaz Ali Brohi, Muhammad Umar Murad, Yasir Nawaz und Uswa Urooj. „An Empirical Evaluation of Data Integrity Algorithm Performance in Non-Relational Document Databases“. VAWKUM Transactions on Computer Sciences 11, Nr. 2 (08.12.2023): 70–82. http://dx.doi.org/10.21015/vtcs.v11i2.1663.

Der volle Inhalt der Quelle
Annotation:
Non-relational document databases are a type of NoSQL databases, are gaining popularity owing to their flexibility, scalability, and performance. Document databases provide some distinct security issues. One of the most difficult security challenges is that they are frequently built to be extremely accessible. This can make them more vulnerable to assault if suitable security measures are not taken. Users of database can access data with weak authentication or authorization. Another issue is that they store data in a semi-structured or unstructured format. This makes it difficult to create and execute security safeguards. It may be difficult to detect and secure sensitive data that is kept. Document databases are certain data integrity problems. In this research work, we have developed Big Document DBCrypto’s architecture under which Middle ware provides users to use symmetric cryptography with any hashing algorithm or asymmetric cryptography with digital signatures to ensure data integrity.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Kunda, Douglas, und Hazael Phiri. „A Comparative Study of NoSQL and Relational Database“. Zambia ICT Journal 1, Nr. 1 (11.12.2017): 1–4. http://dx.doi.org/10.33260/zictjournal.v1i1.8.

Der volle Inhalt der Quelle
Annotation:
Relational Database and NoSQL are competing types of database models. The former has been in existence since 1979 and the latter since the year 2000. The demands of modern applications especially in web 2.0, 3.0 and big data have made NoSQL a popular database of choice. Choosing an appropriate database model to use is an important decision that developers must make based on the features of a given database model. This paper compares the features of Relational Databases and NoSQL to establish which database is better at supporting demands of modern applications. The paper also brings out the challenges of NoSQL. Finally, the paper concludes by determining whether Relational Databases would completely be replaced by NoSQL database models. The findings revealed that, Relational Databases are based on ACID model which emphasizes better consistency, security and offers a standard query language. However, Relational Databases have poor scalability, weak performance, cost more, face availability challenges when supporting large number of users and handle limited volume of data. NoSQL, on the other hand is based on the BASE model, which emphasizes greater scalability and provides a flexible schema, offers better performance, mostly open source, cheap but, lacks a standard query language and does not provide adequate security mechanisms. Both databases will continue to exist alongside each other with none being better than the other. The choice of the database to use will depend on the nature of the application being developed. Each database type has its own challenges and strengths, with relational database lacking of support for unstructured data while NoSQL lacks standardization and has poor security. Modern applications in web 2.0, 3.0 and big data are well suited to use NoSQL but, there are still many applications that rely on Relational Databases.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Larchenko, Maryna. „MODERN PROBLEMS OF CRYPTOGRAPHIC PROTECTION OF DATABASES“. Technical Sciences and Technologies, Nr. 3(29) (2022): 102–13. http://dx.doi.org/10.25140/2411-5363-2022-3(29)-102-113.

Der volle Inhalt der Quelle
Annotation:
In the conditions of growing digitalization of society, the issue of database protection is extremely urgent. Currently, Ukraine is at the stage of introducing European information protection standards, but the software component of its protection also needs further improvement. Information security threats are destruction,modification, blocking, unauthorized access, leakage, disclosure. In particular, cryptographic protection of databases allows preventing access to the information they con-tain by means of mathematical transformations. It is primarily about prevention of unauthorized modification and unauthorized disclosure of information.Cryptographic protection of databases can use encryption of data that is stored in a file (after encryption), as well as en-cryption of directories and files themselves. The approach to database protection should be comprehensive. Therefore, encryption cannot be used to solve access control problems. Encryption keys should be changed regularly as part of good security practices. The database should be unavailable during this time. A copy ofthe database must be stored offline at a remote location for some time. The administrator role can be split between two or more people so that each person does not have full access to the entire database, or the role can be limited to just administering the database without access to the information itself.Protecting the database is becoming an increasingly difficult task for an organization, because sensitive data is often the target of attackers. One of the mandatory requirements for database security is its cryptographic transformation, which is carried out both during the movement of information over networks and during storage in database systems. This can prevent attacks from both external and internal attackers. Although, database encryption cannot overcome all security threats, the application of a well-configured program that uses a reliable algorithm can significantly increase the integrity, confidentiality and availability of database information.Further improvement and development of the national system of cryptographic protection of databases will require a coordinated resolution of issues at the legislative (normative-legal), system-wide, procedural-functional, functional-technical, and software-technical levels.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Li, Guoliang, Haowen Dong und Chao Zhang. „Cloud databases“. Proceedings of the VLDB Endowment 15, Nr. 12 (August 2022): 3758–61. http://dx.doi.org/10.14778/3554821.3554893.

Der volle Inhalt der Quelle
Annotation:
As database vendors are increasingly moving towards the cloud data service, i.e., databases as a service (DBaaS), cloud databases have become prevalent. Compared with the early cloud-hosted databases, the new generation of cloud databases, also known as cloud-native databases, seek for higher elasticity and lower cost by developing new techniques, e.g., compute-storage disaggregation and the log is the database. To better harness the power of these cloud databases, it is important to study and compare the pros and cons of their key techniques. In this tutorial, we offer a comprehensive survey of cloud-native databases. Based on various system architectures, we introduce a taxonomy for the state-of-the-art cloud-native OLTP databases and OLAP databases, respectively. We then take a deep dive into their key techniques regarding storage management, transaction processing, analytical processing, data replication, serverless computing, database recovery, and security. Finally, we discuss the research challenges and opportunities.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Ślęzak, Łukasz, und Jarosław Butanowicz. „Security of Statistical Databases as an element of Enterprise Security Architecture“. Computer Science and Mathematical Modelling 13, Nr. 13 (30.12.2014): 37–44. http://dx.doi.org/10.5604/15084183.1136516.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Gele, Aori. „Study on the Security of the Databases in Cloud Computing Environment“. Applied Mechanics and Materials 443 (Oktober 2013): 473–76. http://dx.doi.org/10.4028/www.scientific.net/amm.443.473.

Der volle Inhalt der Quelle
Annotation:
In the modern information technologies, cloud computing is the most popular. However, the security problems in the application of the cloud databases should be never ignored. In this paper, the characteristics of cloud computing database are first introduced, and then the potential security problems as well as solutions in the application of cloud database are analyzed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Poltavtsev, A. A., A. R. Khabarov und A. O. Selyankin. „Inference Attacks and Information Security in Databases“. Automatic Control and Computer Sciences 54, Nr. 8 (Dezember 2020): 829–33. http://dx.doi.org/10.3103/s0146411620080271.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

M., Monisha, Narmathadevi V. und D. Kerana Hanirex. „Enhancing Security and Consistency for Cloud Databases“. Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552) 2, Nr. 3 (31.03.2015): 49–63. http://dx.doi.org/10.53555/nncse.v2i3.488.

Der volle Inhalt der Quelle
Annotation:
Cloud computing is one of the most important research area. The cloud information don't seem to be safe and secured, because the third parties will access and acquire the knowledge from cloud at any time and will misuse the data or information of a particular user or organization and thus it is concerned, the information stored in cloud should come with the guarantee of security. The effectiveness of the planned design is evaluated through theoretical analysis and intensive experimental results supported a model implementation subject to the TPC-C (Transaction Processing Control) normal benchmark for various numbers of purchasers and network latencies. Information and table information area unit encrypted through constant encoding key before being saved. This encoding secret is known as a passkey. Only trusted clients that already know the key will rewrite the information and acquire data that is necessary to code and rewrite tenant knowledge. Each information is retrieved by purchasers through associated ID. The ID which is generated by the Message Authentication Code (MAC) function to the name of the object (database or table) described by the corresponding row. Deterministic MACfunction allows clients to retrieve the information of a given table by knowing its plaintext name. The advantage during this design is to boost smart Quality of Service (QoS) and Distributing knowledge among completely different suppliers and taking advantage of secret sharing
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Agrawal, D. „Integrating Security with Fault-tolerant Distributed Databases“. Computer Journal 33, Nr. 1 (01.01.1990): 71–78. http://dx.doi.org/10.1093/comjnl/33.1.71.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Hansen, Steven C. „Hybrid inferential security methods for statistical databases“. ACM SIGAPP Applied Computing Review 3, Nr. 1 (20.06.1995): 14–18. http://dx.doi.org/10.1145/214310.214433.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Thuraisingham, Bhavani. „Security and Privacy Issues for Sensor Databases“. Sensor Letters 2, Nr. 1 (01.03.2004): 37–47. http://dx.doi.org/10.1166/sl.2004.022.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Mariuţa, Şerban. „Principles of Security and Integrity of Databases“. Procedia Economics and Finance 15 (2014): 401–5. http://dx.doi.org/10.1016/s2212-5671(14)00465-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Doyle, Sean D. „The Security, Audit and Control of Databases“. Computer Fraud & Security Bulletin 1992, Nr. 3 (März 1992): 17–18. http://dx.doi.org/10.1016/0142-0496(92)90221-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Paniagua Diez, Fidel, Amrutha Chikkanayakanahalli Vasu, Diego Suarez Touceda und Jose Maria Sierra Camara. „Modeling XACML Security Policies Using Graph Databases“. IT Professional 19, Nr. 6 (November 2017): 52–57. http://dx.doi.org/10.1109/mitp.2017.4241465.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

David, Baptiste, Dorian Larget und Thibaut Scherrer. „The security of databases: the Access case“. Journal of Computer Virology and Hacking Techniques 9, Nr. 2 (12.03.2013): 95–107. http://dx.doi.org/10.1007/s11416-013-0182-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Karpisz, Dariusz, Anna Kiełbus und Maryna Zembytska. „Selected Problems of Industry Databases and Information Infrastructure Security“. Quality Production Improvement - QPI 1, Nr. 1 (01.07.2019): 371–77. http://dx.doi.org/10.2478/cqpi-2019-0050.

Der volle Inhalt der Quelle
Annotation:
Abstract The paper presents selected security problems in ICT systems and OT used in industry. In the Industry 4.0 era, the knowledge and competence of the IT staff and the maintenance staff must be linked. Selected problems and their analysis and solutions form the semi-secure network and use of NoSQL databases as a database bridges are presented in the article for various branches of industry.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Subach, I., und O. Vlasenko. „Architecture of intelligent SIEM for detecting cyber incidents in databases of military information and communication systems.“ Communication, informatization and cybersecurity systems and technologies, Nr. 4 (21.12.2023): 82–92. http://dx.doi.org/10.58254/viti.4.2023.07.82.

Der volle Inhalt der Quelle
Annotation:
The article looks at the current supply of cyber defense to the databases of information and communication systems. The effectiveness of continuous visits to databases is analyzed. The analysis indicates that existing systems are not immune to security, which is a critical aspect in the field of cybersecurity. A new approach to the architecture of the SIEM system is being introduced, which is aimed at different parts of the protection circuit of the information and communication system. The fragmented architecture makes it possible to effectively detect and respond to cyber attacks at all levels of protection, from the operating system to databases. A new approach is being introduced to ensure cyber security of databases with the benefit of the intelligent capabilities of the SIEM system. The main aspect of this architecture is rich database protection, which allows you to effectively detect and respond to cyber attacks. The registration approach includes the addition of data from different levels to the security circuit of the information and communication system, the module for analyzing data about categories in the database, which operates on the basis of The use of fuzzy multiplicity theory methods, fuzzy logic inference and rule correlation module to improve the detection of cyber incidents. And also the integration of OLAP technologies to provide a deep and analytical view of the database security system. The architecture for identifying cyber incidents has been designed to improve the efficiency of identifying cyber incidents related to the functioning of the database of information and communication systems and. The result of the investigation is a reduction in the capabilities of the SIEM system in identifying and responding to cyber identities in the database of the military information system. Further, we directly monitor the operational model of the cybersecurity system of the information and communication system database.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie