Academic literature on the topic 'Databases security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Databases security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Databases security"

1

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar, and Supriya N. Deshpande. "Database Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Full text
Abstract:
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privilege, regularly updating and patching DBMS, conducting regular security audits, providing user awareness training, implementing data encryption, monitoring and logging database activities, developing an incident response plan, staying updated with the latest research and best practices, and continuously improving security measures. By following this methodology, organizations can effectively enhance the security of their databases and safeguard critical data from potential attacks and breaches. Emphasis is placed on regular review and updates to security measures to proactively address evolving threats and ensure continuous protection of sensitive data.
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmad, Khaleel, Mohammad Shoaib Alam, and Nur Izura Udzir. "Security of NoSQL Database Against Intruders." Recent Patents on Engineering 13, no. 1 (February 8, 2019): 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.

Full text
Abstract:
Background: The evolution of distributed web-based applications and cloud computing has brought about the demand to store a large amount of big data in distributed databases. Such efficient systems offer excessive availability and scalability to users. The new type of database resolves many new challenges especially in large-scale and high concurrency applications which are not present in the relational database. NoSQL refers to non-relational databases that are different from the Relational Database Management System. Objective: NoSQL has many features over traditional databases such as high scalability, distributed computing, lower cost, schema flexibility, semi or un-semi structural data and no complex relationship. Method: NoSQL databases are “BASE” Systems. The BASE (Basically Available, Soft state, Eventual consistency), formulates the CAP theorem the properties of which are used by BASE System. The distributed computer system cannot guarantee all of the following three properties at the same time that is consistency, availability and partition tolerance. Results: As progressively sharp big data is saved in NoSQL databases, it is essential to preserve higher security measures to ensure safe and trusted communication across the network. In this patent, we describe the security of NoSQL database against intruders which is growing rapidly. Conclusion: This patent also defines probably the most prominent NoSQL databases and describes their security aspects and problems.
APA, Harvard, Vancouver, ISO, and other styles
3

Lysetskyi, Yu M., and D. Y. Kalbazov. "Information security of corporate databases." Mathematical machines and systems 3 (2023): 31–37. http://dx.doi.org/10.34121/1028-9763-2023-3-31-37.

Full text
Abstract:
Every day, companies all over the world collect and generate a large amount of data. Now in-formation is digital and is stored in automated digital databases, the use of which allows for processing large amounts of data that previously were difficult to process. Protecting corporate databases and the information within them is essential for economic security. It includes their physical protection, productivity assurance and monitoring, data protection from destruction or damage, access control, and recording of new databases appearing in the infrastructure. Howev-er, since users of different types and levels of access (internal users, system administrators, contractors, partners, and M2M communications) have access to databases, they can abuse their access rights in several ways. These may be an abuse of excessive, objectively necessary, or non-used rights. As a rule, an inefficiently controlled process of granting access rights creates excessive access rights which in turn may cause new information security risks. Security measures include implementing an access management process, granting minimally necessary access rights, and implementing a mechanism to control and block the given access rights. This article discusses such threats to databases as SQL Injections and NoSQL injection attacks, in-sufficient detailing of events in databases, backup leaks, vulnerabilities and configurations, DDoS attacks, and methods to counter these threats. The most effective way to protect data-bases is to implement specialized software and hardware complexes such as Imperva DBS and Imperva WAF developed for database protection. The use of Imperva DBS will help to solve all the key tasks of database protection and provide complete visibility and control over their usage in the enterprise infrastructure.
APA, Harvard, Vancouver, ISO, and other styles
4

Haikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan, and Hamdani Arif. "Securing Databases: A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33." Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no. 2 (June 18, 2023): 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.

Full text
Abstract:
The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve the security of their databases and protect sensitive information. These research findings demonstrate that enabling SSL encryption leads to longer average execution times for database operations. This latency can be attributed to the computational workload associated with SSL's encryption and decryption processes. However, the trade-off between performance and security is essential to safeguarding data in transit.
APA, Harvard, Vancouver, ISO, and other styles
5

Kyrychenko, I. V., О. S. Nazarov, I. V. Gruzdo, and N. Kozel. "SECURITY IN DECENTRALIZED DATABASES." Bionics of Intelligence 1, no. 92 (June 2, 2019): 59–64. http://dx.doi.org/10.30837/bi.2019.1(92).10.

Full text
Abstract:
Blockchain is a distributed network that records digital transactions on a publicly accessible ledger. This paper explores whether blockchain technology is a suitable platform for the preservation of digital signatures and public/ private key pairs. Conventional infrastructures use digital certificates, issued by certification authorities, to declare the authentication of key pairs and digital signatures. This paper suggests that the blockchain’s hash functions offer a better strategy for signature preservation than digital certificates. Compared to digital certificates, hashing provides better privacy and security. It is a form of authentication that does not require trust in a third-party authority, and the distributed nature of the blockchain network removes the problem of a single point of failure.
APA, Harvard, Vancouver, ISO, and other styles
6

Neto, Afonso Araújo, and Marco Vieira. "Security Gaps in Databases." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 42–62. http://dx.doi.org/10.4018/jsse.2011070103.

Full text
Abstract:
When deploying database-centric web applications, administrators should pay special attention to database security requirements. Acknowledging this, Database Management Systems (DBMS) implement several security mechanisms that help Database Administrators (DBAs) making their installations secure. However, different software products offer different sets of mechanisms, making the task of selecting the adequate package for a given installation quite hard. This paper proposes a methodology for detecting database security gaps. This methodology is based on a comprehensive list of security mechanisms (derived from widely accepted security best practices), which was used to perform a gap analysis of the security features of seven software packages composed by widely used products, including four DBMS engines and two Operating Systems (OS). The goal is to understand how much each software package helps developers and administrators to actually accomplish the security tasks that are expected from them. Results show that while there is a common set of security mechanisms that is implemented by most packages, there is another set of security tasks that have no support at all in any of the packages.
APA, Harvard, Vancouver, ISO, and other styles
7

Pernul, G., and A. M. Tjoa. "Security Policies for Databases." IFAC Proceedings Volumes 25, no. 30 (October 1992): 259–65. http://dx.doi.org/10.1016/s1474-6670(17)49440-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thuraisingham, Bhavani. "Security for Distributed Databases." Information Security Technical Report 6, no. 2 (June 2001): 95–102. http://dx.doi.org/10.1016/s1363-4127(01)00210-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Teimoor, Ramyar Abdulrahman. "A Review of Database Security Concepts, Risks, and Problems." UHD Journal of Science and Technology 5, no. 2 (October 10, 2021): 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.

Full text
Abstract:
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.
APA, Harvard, Vancouver, ISO, and other styles
10

Arputharaj J, Vijay, and Dr R. Manicka Chezian. "A Collective Algorithmic ApproachFor Enhanced DNA Database Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 4, no. 1 (June 30, 2013): 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.

Full text
Abstract:
The proposed method is a mixture of several security methods namely digital authentication tag along with the data mining in the DNA database. Data mining in the area of human genetics, an important goal is to understand the mapping relationship between the individual variation in human DNA sequences and variability in various algorithms for database security issues, for mutation susceptibility and parental identification differences. This paper primarily deals with the advancement of genetic algorithm with proper security features in DNA Databases and it enhances the special features in DNA database security. Several security methods include encryption algorithms, higher, not as much of multifaceted with trouble-free to apply in DNA Databases, used for protected database. The Reverse Encryption algorithm to protect data,Advance Cryptography algorithm to resist data, also Advanced Encryption Standard (AES) is most preferable for security in DNA databases.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Databases security"

1

Chung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases." online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kong, Yibing. "Security and privacy model for association databases." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Redfield, Catherine M. S. "Practical security for multi-user web application databases." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/76820.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2012.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 67-68).
Online web applications are continuously vulnerable to attacks on their users' data. Outside adversaries can gain unauthorized access by exploiting unknown vulnerabilities; curious or malicious database administrators can examine or alter the data in situ. Multiple Principal CryptDB protects against attacks on web application servers. By chaining encryption keys to user passwords, an attacker gaining access to decrypted data through issuing arbitrary queries to the database through CryptDB cannot access data belonging to offline users. A logging system and distributed key storage for CryptDB constrain the pool of possibly compromised data after an attack. Multiple Principal CryptDB can be used to secure the data of six web applications examined, with 2-8 lines of altered source code and 15-111 annotations added to the schema. On the phpBB web forum application, Multiple Principal CryptDB reduces throughput by only 14.5%, with 24 sensitive fields encrypted, and adds less than 26ms of latency to each individual query.
by Catherine M.S. Redfield.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Ye, and 张叶. "Query and access control over encrypted databases." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Farooqi, Norah. "Applying dynamic trust based access control to improve XML databases' security." Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/4468/.

Full text
Abstract:
XML (Extensible Mark-up Language) databases are an active research area. The topic of security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. Trust based access is an established technique in many fields, such as networks and distributed systems, but it has not previously been used for XML databases. In Trust Based Access Control, user privileges are calculated dynamically depending on the user’s behaviour. In this thesis, the novel idea of applying Trust Based Access Control (TBAC) for XML databases has been developed. This approach improves security and provides dynamic access control for XML databases. It manages access policy depending on users’ trustworthiness and prevents unauthorised processes, malicious transactions, and misuse from both outsiders and insiders. A practical Trust Based Access Control system for XML databases was evaluated. The dynamic access control has been tested from security, scalability, functionality, performance, and storage perspectives. The experimental results illustrate the flexibility of Trust Values and the scalability of the system with small to large XML databases and with various numbers of users. The results show that the main research idea of this study is worth pursuing and the system could be developed further.
APA, Harvard, Vancouver, ISO, and other styles
6

Ofori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches." ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.

Full text
Abstract:
Insider threat continues to pose a risk to organizations, and in some cases, the country at large. Data breach events continue to show the insider threat risk has not subsided. This qualitative case study sought to explore the data security management strategies used by database and system administrators to prevent data breaches by malicious insiders. The study population consisted of database administrators and system administrators from a government contracting agency in the northeastern region of the United States. The general systems theory, developed by Von Bertalanffy, was used as the conceptual framework for the research study. The data collection process involved interviewing database and system administrators (n = 8), organizational documents and processes (n = 6), and direct observation of a training meeting (n = 3). By using methodological triangulation and by member checking with interviews and direct observation, efforts were taken to enhance the validity of the findings of this study. Through thematic analysis, 4 major themes emerged from the study: enforcement of organizational security policy through training, use of multifaceted identity and access management techniques, use of security frameworks, and use of strong technical control operations mechanisms. The findings of this study may benefit database and system administrators by enhancing their data security management strategies to prevent data breaches by malicious insiders. Enhanced data security management strategies may contribute to social change by protecting organizational and customer data from malicious insiders that could potentially lead to espionage, identity theft, trade secrets exposure, and cyber extortion.
APA, Harvard, Vancouver, ISO, and other styles
7

Olk, Jeffrey S. "Exploring the lack of interoperability of databases within Department of Homeland Security interagency environment concerning maritime port security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FOlk.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Bordetsky, Alex. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Interoperability, HSIN, Department of Homeland Security, Command and Control, Situational Awareness, Maritime Port Security, USCG, CBP. Includes bibliographical references (p. 63-67). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

Kohler, Matthew J., and Shawn W. Stroud. "An effective access control mechanism and multilevel security for multilevel secure databases." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patterson, Joanna. "Cyber-Security Policy Decisions in Small Businesses." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4551.

Full text
Abstract:
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions was to identify strategies that successful small business owners use to make cyber-security decisions. Data analysis consisted of coding keywords, phrases, and sentences from semi structured interviews as well as document analysis. The following themes emerged: government requirements, peer influence, budgetary constraints, commercial standards, and lack of employee involvement. According to the participants, budgetary constraints and peer influence were the most influential factors when making decisions regarding cyber-security strategies. Through exposing small business owners to proven strategies, the implications for social change include a reduction of their small business operating costs and assistance with compliance activities.
APA, Harvard, Vancouver, ISO, and other styles
10

Hermansson, Tobias. "FiLDB : An Architecture for Securely Connecting Databases to the Internet." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.

Full text
Abstract:

Today more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.

There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.

The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Databases security"

1

Polischuk, Yuriy, and Aleksandr Borovskiy. Databases and their security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1011088.

Full text
Abstract:
The tutorial is devoted to the implementation of relational databases. Its purpose is to master the basic principles of design, implementation, maintenance and information security of databases. The manual includes tasks for laboratory work, control questions and tests for self-examination. Meets the requirements of the Federal state educational standards of higher education of the last generation. For students of higher educational institutions of all specialties and areas of training, interested in the design, implementation and security of databases.
APA, Harvard, Vancouver, ISO, and other styles
2

Faragallah, Osama S. Multilevel security for relational databases. Boca Raton: Taylor & Francis, CRC Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IFIP TC11/WG11.3 Working Conference on Database and Application Security (15th 2001 Niagara-on-the-Lake, Ont.). Database and application security XV: IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. Boston: Kluwer Academic Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

IFIP TC11/WG 11.3 International Conference on Database Security (10th 1996 Como, Italy). Database security, volume X: Status and prospects. London: Chapman & Hall on behalf of the International Federation for Information Processing, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1956-, Atluri Vijay, and Samarati Pierangela, eds. Security of data and transaction processing. Boston: Kluwer Academic, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wiseman, Simon. Lies, damned lies, and databases. London: Controller HMSO, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rodney, Clark, Holloway Simon, and List William, eds. The security, audit, and control of databases. Aldershot: Avebury Technical, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

OOPSLA (Conference) (1993 Washington, D.C.). Security for object-oriented systems: Proceedings of the OOPSLA-93 conference, Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993. London: Springer-Verlag, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

IFIP, TC11/WG11 3. Working Conference on Database Security (14th 2000 Schoorl Netherlands). Data and applications security: Developments and directions : IFIP TC11 WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. Boston: Kluwer Academic Publishers, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

DTA (Conference) (2009 Cheju Island, Korea). Database theory and application: International conference, DTA 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009 proceedings. Berlin: Springer, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Databases security"

1

Kaufmann, Michael, and Andreas Meier. "Database Security." In SQL and NoSQL Databases, 111–58. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27908-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Adam, Nabil, Haibing Lu, Jaideep Vaidya, and Basit Shafiq. "Statistical Databases." In Encyclopedia of Cryptography and Security, 1256–60. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Olivier, Martin S. "Integrity Constraints in Federated Databases." In Database Security, 43–57. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bhatnagar, Neerja. "Security in Relational Databases." In Handbook of Information and Communication Security, 257–72. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-04117-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ozsoyoglu, Gultekin, David A. Singer, and Sun S. Chung. "Anti-Tamper Databases." In Data and Applications Security XVII, 133–46. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8070-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aisbett, J. E. "An information theoretic analysis of architectures for multilevel secure databases." In Database Security, 212–25. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thuraisingham, Bhavani. "Foundations of Multilevel Databases." In Research Directions in Database Security, 199–226. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4612-2870-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stoller, Scott D. "Trust Management in Databases." In Encyclopedia of Cryptography and Security, 1326–27. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Biskup, Joachim, and Barbara Sprick. "Towards Unifying Semantic Constraints and Security Constraints." In Semantics in Databases, 34–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36596-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Osborn, Sylvia L., Laura K. Reid, and Gregory J. Wesson. "On the Interaction Between Role-Based Access Control and Relational Databases." In Database Security, 275–87. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-0-387-35167-4_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Databases security"

1

Beaubouef, Theresa, and Frederick E. Petry. "Database security issues in rough relational databases." In 2010 42nd Southeastern Symposium on System Theory (SSST 2010). IEEE, 2010. http://dx.doi.org/10.1109/ssst.2010.5442811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Imran, Sohail, and Irfan Hyder. "Security Issues in Databases." In 2009 Second International Conference on Future Information Technology and Management Engineering (FITME). IEEE, 2009. http://dx.doi.org/10.1109/fitme.2009.140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Okman, Lior, Nurit Gal-Oz, Yaron Gonen, Ehud Gudes, and Jenny Abramov. "Security Issues in NoSQL Databases." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bender, Gabriel, Lucja Kot, and Johannes Gehrke. "Explainable security for relational databases." In SIGMOD/PODS'14: International Conference on Management of Data. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2588555.2593663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ahlswede, R., and H. Aydinian. "On security of statistical databases." In 2006 IEEE International Symposium on Information Theory. IEEE, 2006. http://dx.doi.org/10.1109/isit.2006.261767.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bi, Chuanxue, and Nenad Jukic. "A security paradigm for Web databases." In the 37th annual Southeast regional conference (CD-ROM). New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/306363.306420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ocenas, Martin, Ivan Homoliak, Petr Hanacek, and Kamil Malinka. "Security and Encryption at Modern Databases." In ICCSP 2020: 2020 4th International Conference on Cryptography, Security and Privacy. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377644.3377662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gui, Zichen, Oliver Johnson, and Bogdan Warinschi. "Encrypted Databases." In CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3319535.3363210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Awodiji, Temitope. "Database Security in a Dynamic IT world." In 7th International Conference on Software Engineering and Applications (SOFEA 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111613.

Full text
Abstract:
Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.
APA, Harvard, Vancouver, ISO, and other styles
10

Mhatre, Amit J., Srinivas Palla, Sharat Chikkerur, and Venu Govindaraju. "Efficient search and retrieval in biometric databases." In Defense and Security, edited by Anil K. Jain and Nalini K. Ratha. SPIE, 2005. http://dx.doi.org/10.1117/12.604173.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Databases security"

1

Jajodia, Sushil, and Boris Kogan. Implementation Issues in Multilevel Security for Object-Oriented Databases. Fort Belvoir, VA: Defense Technical Information Center, May 1990. http://dx.doi.org/10.21236/ada224489.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v1.

Full text
Abstract:
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and consistent with law, agency mission, resource constraints, and U.S. national, homeland, and economic security, NIST will promote the deposit of scientific data arising from unclassified research and programs, funded wholly or in part by NIST, except for Standard Reference Data, free of charge in publicly accessible databases. Subject to the same conditions and constraints listed above, NIST also intends to make freely available to the public, in publicly accessible repositories, all peer-reviewed scholarly publications arising from unclassified research and programs funded wholly or in part by NIST. This Special Publication represents the work of researchers at professional conferences, as reported in Fiscal Year 2019. More information on public access to NIST research is available at https://www.nist.gov/ open.
APA, Harvard, Vancouver, ISO, and other styles
3

Miller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v2.

Full text
Abstract:
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and consistent with law, agency mission, resource constraints, and U.S. national, homeland, and economic security, NIST will promote the deposit of scientific data arising from unclassified research and programs, funded wholly or in part by NIST, except for Standard Reference Data, free of charge in publicly accessible databases. Subject to the same conditions and constraints listed above, NIST also intends to make freely available to the public, in publicly accessible repositories, all peer-reviewed scholarly publications arising from unclassified research and programs funded wholly or in part by NIST. This Special Publication represents the work of researchers at professional conferences, as reported in Fiscal Year 2019. More information on public access to NIST research is available at https://www.nist.gov/ open.
APA, Harvard, Vancouver, ISO, and other styles
4

Miller, Kathryn. NIST Conference Papers Fiscal Year 2019 NIST Conference Papers Fiscal Year 2019. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.sp.1276v3.

Full text
Abstract:
NIST is committed to the idea that results of federally funded research are a valuable national resource and a strategic asset. To the extent feasible and consistent with law, agency mission, resource constraints, and U.S. national, homeland, and economic security, NIST will promote the deposit of scientific data arising from unclassified research and programs, funded wholly or in part by NIST, except for Standard Reference Data, free of charge in publicly accessible databases. Subject to the same conditions and constraints listed above, NIST also intends to make freely available to the public, in publicly accessible repositories, all peer-reviewed scholarly publications arising from unclassified research and programs funded wholly or in part by NIST. This Special Publication represents the work of researchers at professional conferences, as reported in Fiscal Year 2019. More information on public access to NIST research is available at https://www.nist.gov/ open.
APA, Harvard, Vancouver, ISO, and other styles
5

Baer, M., R. Charlet, W. Hardaker, R. Story, and C. Wang. IPsec Security Policy Database Configuration MIB. RFC Editor, March 2007. http://dx.doi.org/10.17487/rfc4807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Burns, Rae K. Research Directions in Database Security IV. Fort Belvoir, VA: Defense Technical Information Center, July 1993. http://dx.doi.org/10.21236/ada268885.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lung, Teresa F. Discretionary Security for Object-Oriented Database Systems. Fort Belvoir, VA: Defense Technical Information Center, March 1991. http://dx.doi.org/10.21236/ada237573.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Polk, W. Timothy, and Lawrence E, III Bassham. Security issues in the database language SQL. Gaithersburg, MD: National Institute of Standards and Technology, 1993. http://dx.doi.org/10.6028/nist.sp.800-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Banerjee, Onil, Martin Cicowiez, Ana Rios, and Cicero De Lima. Climate Change Impacts on Agriculture in Latin America and the Caribbean: An Application of the Integrated Economic-Environmental Modeling (IEEM) Platform. Inter-American Development Bank, November 2021. http://dx.doi.org/10.18235/0003794.

Full text
Abstract:
In this paper, we assess the economy-wide impact of Climate Change (CC) on agriculture and food security in 20 Latin American and the Caribbean (LAC) countries. Specifically, we focus on the following three channels through which CC may affect agricultural and non-agricultural production: (i) agricultural yields; (ii) labor productivity in agriculture, and; (iii) economy-wide labor productivity. We implement the analysis using the Integrated Economic-Environmental Model (IEEM) and databases for 20 LAC available through the OPEN IEEM Platform. Our analysis identifies those countries most affected according to key indicators including Gross Domestic Product (GDP), international commerce, sectoral output, poverty, and emissions. Most countries experience negative impacts on GDP, with the exception of the major soybean producing countries, namely, Brazil, Argentina and Uruguay. We find that CC-induced crop productivity and labor productivity changes affect countries differently. The combined impact, however, indicates that Belize, Nicaragua, Guatemala and Paraguay would fare the worst. Early identification of these hardest hit countries can enable policy makers pre-empting these effects and beginning the design of adaptation strategies early on. In terms of greenhouse gas emissions, only Argentina, Chile and Uruguay would experience small increases in emissions.
APA, Harvard, Vancouver, ISO, and other styles
10

Burov, Oleksandr Yu, Svitlana H. Lytvynova, Сергій Олексійович Семеріков, Yuliia V. Yechkalo, Олександр Юрійович Буров, Світлана Григорівна Литвинова, and Юлія Володимирівна Єчкало. ICT for disaster-resilient education and training. CEUR Workshop Proceedings, September 2023. http://dx.doi.org/10.31812/123456789/7826.

Full text
Abstract:
The 3L-Person 2022 workshop was held in Kryvyi Rih, Ukraine, on October 25, 2022. The workshop aimed to provide a platform for researchers and practitioners from different domains and regions, who are interested in exploring the opportunities and challenges of information and communication technologies (ICT) for lifelong learning and professional development. The workshop addressed various topics related to the design, development, evaluation, and application of ICT for education and training, such as personal learning environment design, advanced ICT for professional retraining and training in the workplace, blended and remote learning/teaching with emerging ICT, educational robots, databases and language technologies for open learning and research, ICT in education of a person with special needs, ICT in education safety and security, ICT-support of STEM education and professional career, and synthetic learning environment. The workshop featured 13 papers selected by a diverse and qualified program committee. The workshop also facilitated the discussion and networking among the participants,who shared their experiences and insights on the emerging trends and issues in this interdisciplinary field. This paper presents the theme, aims, topics of interest, program committee, accepted papers, and outcomes of the workshop.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography