Articles de revues sur le sujet « Database security »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Database security.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « Database security ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Ingole, Prof K. R., Akshada S. Hage, Khushali V. Dudhabade, Sakshi D. Tayade, Radhika S. Khewalkar et Supriya N. Deshpande. « Database Security ». International Journal for Research in Applied Science and Engineering Technology 11, no 4 (30 avril 2023) : 1568–76. http://dx.doi.org/10.22214/ijraset.2023.50415.

Texte intégral
Résumé :
Abstract: Database security is a crucial factor in safeguarding sensitive data in today's information-centric world. As organizations increasingly rely on databases for storing and managing vast volumes of data, ensuring the security of databases has become a top priority. This paper proposes a methodology for enhancing database security by addressing identified challenges and attacks. The methodology involves various steps, including identifying and assessing potential threats, evaluating existing security measures, implementing multi-layered defense, enforcing the principle of least privilege, regularly updating and patching DBMS, conducting regular security audits, providing user awareness training, implementing data encryption, monitoring and logging database activities, developing an incident response plan, staying updated with the latest research and best practices, and continuously improving security measures. By following this methodology, organizations can effectively enhance the security of their databases and safeguard critical data from potential attacks and breaches. Emphasis is placed on regular review and updates to security measures to proactively address evolving threats and ensure continuous protection of sensitive data.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Denning, D. E. « Database Security ». Annual Review of Computer Science 3, no 1 (juin 1988) : 1–22. http://dx.doi.org/10.1146/annurev.cs.03.060188.000245.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Lunt, Teresa F., et Eduardo B. Fernandez. « Database security ». ACM SIGMOD Record 19, no 4 (décembre 1990) : 90–97. http://dx.doi.org/10.1145/122058.122069.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Morrison, Paul. « Database Security ». Network Security 2003, no 6 (juin 2003) : 11–12. http://dx.doi.org/10.1016/s1353-4858(03)00610-x.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Parisi, Cameron, et Samantha Renicker. « Database security ». Advances in Engineering Innovation 2, no 1 (7 octobre 2023) : 10–13. http://dx.doi.org/10.54254/2977-3903/2/2023013.

Texte intégral
Résumé :
In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously guard the sanctity of individual consumer data. The core aim of this discourse is to furnish a panoramic understanding of indispensable measures to bolster database security, with an amplified emphasis on countering SQL injection threats. The introductory segment delineates essential fortification strategies and succinctly touches upon optimal practices for shaping a database environments network topography and error mitigation methodologies. Subsequent to this panoramic insight, the discourse pivots to spotlight a diverse array of methodologies to discern and neutralize SQL injection forays.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Said, Huwida E., Mario A. Guimaraes, Zakaria Maamar et Leon Jololian. « Database and database application security ». ACM SIGCSE Bulletin 41, no 3 (25 août 2009) : 90–93. http://dx.doi.org/10.1145/1595496.1562909.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

ITAI, YAYA, AWODELE OLUDELE PhD et NICOLAE GOGA PhD. « Trigger and Database Security ». INTERNATIONAL JOURNAL OF COMPUTERS & ; TECHNOLOGY 4, no 1 (1 février 2013) : 57–62. http://dx.doi.org/10.24297/ijct.v4i1b.3060.

Texte intégral
Résumé :
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Mamta Rani. « Database security at cache layer ». International Journal of Science and Research Archive 9, no 2 (30 juillet 2023) : 016–19. http://dx.doi.org/10.30574/ijsra.2023.9.2.0506.

Texte intégral
Résumé :
As database security is the main concern, we are going to place an encryption module at the cache layer. All the encryption and decryption will be done at the cache layer before storing that data to the database, which will provide more security to the database Higher level security should be provided to the database so here we are placing an idea of Elliptical Curve Cryptography. A database is a collection of data that helps us to collect, retrieve, organize and manage the data in an efficient and effective manner. Databases are critical assets. They store client details, financial information, personal files, company secrets and other data necessary for business. Today database security is getting greater importance than the past which is the amount of data is stored in a corporate database is increasing. People are depending more on the corporate data for making a decision, management of customer service and supply chain management etc. Data stored in databases is usually very vulnerable data so it becomes very important and crucial to maintain this data securely. There are many front end applications that fetch data from secondary storage to main memory for processing and from main memory, data is stored in cache for temporary processing. Any loss or unavailability of data may seriously affect its performance. The database security should provide protected access to the contents of a database and should preserve the integrity, availability, consistency, and quality of the data. In this paper, I present a model where data is protected even on cache layer.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Mehta, Raju. « Oracle Database Security ». Information Systems Security 13, no 5 (novembre 2004) : 40–52. http://dx.doi.org/10.1201/1086/44797.13.5.20041101/84908.6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Harris, Duncan, et David Sidwell. « Distributed database security ». Computers & ; Security 13, no 7 (janvier 1994) : 547–57. http://dx.doi.org/10.1016/0167-4048(94)90003-5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Vishwakarma, Jaychand, et Abhishek Shukla. « Survey on Security Issues and Their Techniques in DBMS ». International Journal of Advanced Research in Computer Science and Software Engineering 8, no 1 (30 janvier 2018) : 124. http://dx.doi.org/10.23956/ijarcsse.v8i1.544.

Texte intégral
Résumé :
Nowadays a Database security has become an important issue in technical world. The main objective of database security is to forbid unnecessary information exposure and modification data while ensuring the availability of the needed services. A numbers of security methods have been created for protecting the databases. Many security models have been developed based on different security aspects of database. All of these security methods are useful only when the database management system is designed and developing for protecting the database. Recently the growth of web application with database at its backend Secure Database Management System is more essential than only a Secure Database. Therefore this paper highlight on the Threats, Security Methods and Vulnerabilities in Database Management System with the help of survey performed on the field of secure databases.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Ahmad, Khaleel, Mohammad Shoaib Alam et Nur Izura Udzir. « Security of NoSQL Database Against Intruders ». Recent Patents on Engineering 13, no 1 (8 février 2019) : 5–12. http://dx.doi.org/10.2174/1872212112666180731114714.

Texte intégral
Résumé :
Background: The evolution of distributed web-based applications and cloud computing has brought about the demand to store a large amount of big data in distributed databases. Such efficient systems offer excessive availability and scalability to users. The new type of database resolves many new challenges especially in large-scale and high concurrency applications which are not present in the relational database. NoSQL refers to non-relational databases that are different from the Relational Database Management System. Objective: NoSQL has many features over traditional databases such as high scalability, distributed computing, lower cost, schema flexibility, semi or un-semi structural data and no complex relationship. Method: NoSQL databases are “BASE” Systems. The BASE (Basically Available, Soft state, Eventual consistency), formulates the CAP theorem the properties of which are used by BASE System. The distributed computer system cannot guarantee all of the following three properties at the same time that is consistency, availability and partition tolerance. Results: As progressively sharp big data is saved in NoSQL databases, it is essential to preserve higher security measures to ensure safe and trusted communication across the network. In this patent, we describe the security of NoSQL database against intruders which is growing rapidly. Conclusion: This patent also defines probably the most prominent NoSQL databases and describes their security aspects and problems.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Alshammari, Bandar M. « Security Assessment Model for Database Relational Designs ». Journal of Medical Imaging and Health Informatics 9, no 6 (1 août 2019) : 1171–80. http://dx.doi.org/10.1166/jmihi.2019.2715.

Texte intégral
Résumé :
The increasing number of data breaches has led many organizations to focus on securing their IT infrastructures and application architectures. However, the main causes of many of the latest attacks are not associated with these two architectures. The damage caused by most of the recent attacks could have been minimized if more attention was given to enhancing the security of all components of the database architecture. The existing enterprise database architecture frameworks do not consider this issue a priority; hence, it has received minimal attention. The enterprise database architecture is the most important architecture because it is responsible for defining how all types of data, whether security-critical or not, are stored and accessed. This paper focuses on addressing the lack of a complete solution to help enterprise system architects to address the security of their organizations from early stages. The novelty of this approach is that it specifies how to modify the required artifacts by the enterprise database architecture to address security-critical data. The approach also defines a number of security measurements that help enterprise architects in measuring the security of the organization database based on those artifacts. These metrics are developed based on the results of a cybersecurity experiment conducted on 100 randomly selected open-source websites. The paper's contributions also consist of the definition of a number of security refactoring rules that specify how to modify current enterprise databases to make them more secure. This paper uses an existing relational diagram for a health clinic database to illustrate the application of the model to an existing database. The validity and applicability of these metrics and refactoring rules are proved using an experiment conducted on a number of security-related databases.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Mocean, Loredana, et Miranda-Petronella Vlad. « Database Security in RDF Terms ». Scientific Bulletin 28, no 1 (1 juin 2023) : 55–65. http://dx.doi.org/10.2478/bsaft-2023-0006.

Texte intégral
Résumé :
Abstract Databases are perhaps the most attacked and vulnerable elements in the online environment as far as organizations are concerned. The databases contain the most important information of an organization and its confidential data, along with those of its customers. However, little of the effort dedicated to security is intended to protect data. The present paper draws attention to the need to implement a simple and then complex security in a database using RDF (Resource Description Framework) based descriptions. Our example is one implemented for Microsoft Access and covers different security level descriptions considering attack types. We choose to represent the basic concepts and abstract syntax using the RDF data modeling vocabulary and we’re using as a starting point a legacy relational database where the company already catalogued attacks.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Pangalos, G. J. « Medical database security evaluation ». Medical Informatics 18, no 4 (janvier 1993) : 283–92. http://dx.doi.org/10.3109/14639239309025317.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Singhal, Yash, Adwit Agarwal, Shivank Mittal, Shristi Katyayani et Amit Sharma. « Database Security using Cryptography ». International Journal for Research in Applied Science and Engineering Technology 10, no 6 (30 juin 2022) : 582–87. http://dx.doi.org/10.22214/ijraset.2022.43621.

Texte intégral
Résumé :
Abstract: There has been an explosion in data since last two decades and this explosion of data is due to high rates of data conversion and better internet services worldwide [21]. All the conventional methods of data handling have been replaced by much more sophisticated means. One of the typical shifts of the emerging information society is that information is becoming a crucial if not the most vital source. Information contrasts profoundly from further resources; for example and it can be imitative without cost, it can be erased without leaving traces. [22] Protecting the new resource information is a major issue in the information economy [20]. One such means is a Database. It makes it easier for data related queries butit can be dangerous if this data is leaked or sent outside the organization. A high price is positioned on confidentiality when information concerning statesecrets, business plans, war strategy, medical recordsand financial transactions needs to be stored or transmitted. Since its inception, the Internet has enable [19]. A cyber crime emerging in recent years data breachis one of the most notorious and disastrous data crimes majorly caused due to unsecure database. To secure these databases we can apply the concepts of AES algorithm. It is an algorithm used in cryptographywhich changes normal text to unreadable or cypher text. Keywords: Cryptography, AES, cypher, digitzation, confidentiality
Styles APA, Harvard, Vancouver, ISO, etc.
17

Pernul, G., et G. Luef. « Bibliography on database security ». ACM SIGMOD Record 21, no 1 (mars 1992) : 105–22. http://dx.doi.org/10.1145/130868.130884.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Pangalos, G. J. « Medical Database Security Policies ». Methods of Information in Medicine 32, no 05 (1993) : 349–56. http://dx.doi.org/10.1055/s-0038-1634952.

Texte intégral
Résumé :
AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care. The general framework and the requirements for medical database security are presented. The three prominent proposals for medical database security are discussed in some detail, together with specific proposals for medical database security. A number of parameters for a secure medical database development are presented and discussed, and guidelines are given for the development of secure medical database systems.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Jajodia, Sushil. « Database security and privacy ». ACM Computing Surveys 28, no 1 (mars 1996) : 129–31. http://dx.doi.org/10.1145/234313.234370.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Munro, Ken. « Database security — an oxymoron ? » Infosecurity Today 3, no 6 (novembre 2006) : 42. http://dx.doi.org/10.1016/s1742-6847(06)70485-2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Pangalos, G., M. Khair et L. Bozios. « Enhancing medical database security ». Journal of Medical Systems 18, no 4 (août 1994) : 159–71. http://dx.doi.org/10.1007/bf00996700.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Pan, Xueying, Anthony Obahiaghon, Brendan Makar, Samuel Wilson et Christian Beard. « Analysis of Database Security ». OALib 11, no 04 (2024) : 1–19. http://dx.doi.org/10.4236/oalib.1111366.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

P.J, Sankaranarayanan, et Geogen George. « Blockchain Based Aadhaar Security ». International Journal of Engineering & ; Technology 7, no 4.6 (25 septembre 2018) : 398. http://dx.doi.org/10.14419/ijet.v7i4.6.28450.

Texte intégral
Résumé :
A blockchain is a decentralized, disseminated and digital ledger that can’t be altered retroactively without modifying every single blocks and the consensus of the network. Blockchain can be used in smart contracts, Banks, IoT devices, Database management, etc., Due to recent times flaws and leakage of Aadhaar information (Aadhaar which is the largest government databases of the Indian citizens) in Internet the security and privacy of Aadhaar became questionable. In order to ensure the security of Aadhaar, Blockchain has the potential to overcome security and privacy challenges in Aadhaar. In this project we are going to create a Blockchain for Aadhaar database and implement light weight algorithm for efficiency, optimization and scalability along with the Blockchain securing algorithm.
Styles APA, Harvard, Vancouver, ISO, etc.
24

BAI, YUN, et YAN ZHANG. « ARTIFICIAL INTELLIGENCE IN DATABASE SECURITY ». International Journal of Pattern Recognition and Artificial Intelligence 18, no 01 (février 2004) : 3–17. http://dx.doi.org/10.1142/s0218001404003022.

Texte intégral
Résumé :
In this paper, we propose a formal approach of Artificial Intelligence (AI) in securing object oriented database systems. We combine the specification of object oriented database with security policies and provide its formal syntax and semantics. The properties in the inheritance of authorizations in object oriented database system and reasoning about authorizations on data objects are also investigated in detail.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Alshammari, Ahmad. « Structuring and organizing database security domain from big data perspective using meta-modeling approach ». International Journal of ADVANCED AND APPLIED SCIENCES 11, no 2 (février 2024) : 180–94. http://dx.doi.org/10.21833/ijaas.2024.02.019.

Texte intégral
Résumé :
Database security is an area focused on safeguarding databases against harmful access. It involves ensuring data accuracy, blocking unauthorized entry, and preventing harmful code within the database. Although various security models and methods exist, they often don't comprehensively cover all aspects of database security. This leads to a diverse and unclear understanding of database security among experts. This study proposes a unified framework, the Database Security Meta-model (DBSM), which acts as a standard language in this field. The DBSM, comprising twelve main elements, is thoroughly vetted to align with security needs and offers guidelines for practitioners to create specific security solutions.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Teimoor, Ramyar Abdulrahman. « A Review of Database Security Concepts, Risks, and Problems ». UHD Journal of Science and Technology 5, no 2 (10 octobre 2021) : 38–46. http://dx.doi.org/10.21928/uhdjst.v5n2y2021.pp38-46.

Texte intégral
Résumé :
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly. Database systems are critical to your company because they convey data about sales transactions, product inventories, customer profiles, and marketing activities. To accomplish data manipulation and maintenance activities the Database Management System considered. Databases differ because their conclusions based on countless rules about what an invulnerable database constitutes. As a result, database protection seekers encounter difficulties in terms of a fantastic figure selection to maintain their database security. The main goal of this study is to identify the risk and how we can secure databases, encrypt sensitive data, modify system databases, and update database systems, as well as to evaluate some of the methods to handle these problems in security databases. However, because information plays such an important role in any organization, understanding the security risk and preventing it from occurring in any database system require a high level of knowledge. As a result, through this paper, all necessary information for any organization has been explained; in addition, also a new technological tool that plays an essential role in database security was discussed.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Arputharaj J, Vijay, et Dr R. Manicka Chezian. « A Collective Algorithmic ApproachFor Enhanced DNA Database Security ». INTERNATIONAL JOURNAL OF MANAGEMENT & ; INFORMATION TECHNOLOGY 4, no 1 (30 juin 2013) : 174–78. http://dx.doi.org/10.24297/ijmit.v4i1.4631.

Texte intégral
Résumé :
The proposed method is a mixture of several security methods namely digital authentication tag along with the data mining in the DNA database. Data mining in the area of human genetics, an important goal is to understand the mapping relationship between the individual variation in human DNA sequences and variability in various algorithms for database security issues, for mutation susceptibility and parental identification differences. This paper primarily deals with the advancement of genetic algorithm with proper security features in DNA Databases and it enhances the special features in DNA database security. Several security methods include encryption algorithms, higher, not as much of multifaceted with trouble-free to apply in DNA Databases, used for protected database. The Reverse Encryption algorithm to protect data,Advance Cryptography algorithm to resist data, also Advanced Encryption Standard (AES) is most preferable for security in DNA databases.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Haikal, Antoni, Heru Wijanarko, Ocha Oktafia, Muhammad Hikmah Husnuzon, Gunawan Gunawan et Hamdani Arif. « Securing Databases : A Comparative Study on the Impact of Implementing SSL on MySQL 8.0.33 ». Jurnal Jartel Jurnal Jaringan Telekomunikasi 13, no 2 (18 juin 2023) : 135–41. http://dx.doi.org/10.33795/jartel.v13i2.735.

Texte intégral
Résumé :
The increasing reliance on online communication and data storage has made protecting sensitive information a top priority for businesses and individuals. This study investigates the effectiveness of different security protocols in safeguarding databases from external threats. By comparing the performance of databases that use SSL and those that do not, this project provided valuable insights into the importance of securing data in transit and the impact of security protocols on database performance. The results of this research could be helpful for companies and individuals looking to improve the security of their databases and protect sensitive information. These research findings demonstrate that enabling SSL encryption leads to longer average execution times for database operations. This latency can be attributed to the computational workload associated with SSL's encryption and decryption processes. However, the trade-off between performance and security is essential to safeguarding data in transit.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Li, Dan Ning, Qi Li et Xin Qiang Ma. « Research of Security Mechanisms Based on LogicSQL Database ». Applied Mechanics and Materials 155-156 (février 2012) : 352–56. http://dx.doi.org/10.4028/www.scientific.net/amm.155-156.352.

Texte intégral
Résumé :
LogicSQL is an object relational database management system implemented with the advanced (formula-lock based) concurrency control protocol, and the steged database architecture. It is independently developed based on the Linux high-level security database system. Ministry of Science and Technology "863" Database Group of the major projects comments LogicSQL database "It is the only hope that China’s database products will be able to contend with America’s mainstream database products in the next few years." Access control policies are security policies that govern access to resources. It can be applied to several new types of databases. In this paper, we discuss access control in multilevel database management systems applies and illustrate the main applies of security mechanisms in the LogicSQL database system.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Ansari, Sakil Ahmad, et Jaychand Vishwakarma. « Survey on Database Concurrency Control in Multilevel Secure Database Management Systems ». International Journal of Advanced Research in Computer Science and Software Engineering 8, no 4 (30 avril 2018) : 105. http://dx.doi.org/10.23956/ijarcsse.v8i4.645.

Texte intégral
Résumé :
Transactions are vital for database management systems (DBMSs) because they provide transparency to concurrency and failure. Concurrent execution of transactions may lead to contention for access to data, which in a multilevel secure DBMS (MLSIDBMS) may lead to insecurity. In this paper we examine security issues involved in database concurrency control for MLS/DBMSs and show how a scheduler can affect security. We introduce Data Conflict Security; (DC-Security) a property that implies a system is free of convert channels due to contention for access to data. We present a definition of DC Security based on noninterference. Two properties that constitute a necessary condition for DC-Security are introduced along with two other simpler necessary conditions. We have identified a class of schedulers we call Output-State-Equivalent for which another criterion implies DC-Security. The criterion considers separately the behavior of the scheduler in response to those inputs that cause rollback and those that do not. We characterize the security properties of several existing scheduling protocols and find many to be insecure
Styles APA, Harvard, Vancouver, ISO, etc.
31

Salman Rasheed Owaid. « Security of encrypted cloud database ». Наука і техніка Повітряних Сил Збройних Сил України, no 2(31) (27 avril 2018) : 122–30. http://dx.doi.org/10.30748/nitps.2018.31.16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Muhammad Sani, Habiba, et Muhammad Mika'ilu Yabo. « A Database System Security Framework ». International Journal of Computer Science and Information Technology 7, no 6 (31 décembre 2015) : 165–74. http://dx.doi.org/10.5121/ijcsit.2015.7614.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

RM, Deepa. « Database Security with Fingerprint Masking ». International Journal for Research in Applied Science and Engineering Technology 10, no 7 (31 juillet 2022) : 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.

Texte intégral
Résumé :
Abstract: Information in numerous areas including medication, business, and science wasso crucial, in which directories are utilized efficiently for information sharing.Nevertheless, the directories confront the danger to be pirated, taken or even misused, which might lead to many of protection risks regarding ownership rights, informationtampering as well as secrecy safeguards. Watermarking is the technology which is used to secure the database from the various attacks.It is also used to hide the content from the un authorized users. The majority of state-of-the- art techniques alter the initial information to a big level, lead to information quality wreckage,and then can't attain balance that is good between robustness from malicious strikes as well as information restoration. we suggest a reversible and robust watermarking method with Genetic Algorithm and Histogram ShiftingWatermarking (GAHSW) to relation the numerical data. This algorithm used to get the unique key for the database as well as the watermarked place. Experimental evaluation show the usefulness and methods within theterminology of robustness from malicious strikes as well as upkeep of information quality.We have achieved the security level on comparing with existing system
Styles APA, Harvard, Vancouver, ISO, etc.
34

Denning, D. E., S. G. Ak, M. Heckman, T. F. Lunt, M. Morgenstern, P. G. Neumann et R. R. Schell. « Views for Multilevel Database Security ». IEEE Transactions on Software Engineering SE-13, no 2 (février 1987) : 129–40. http://dx.doi.org/10.1109/tse.1987.232889.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Kang, Yue. « Legal Protection of Database Security ». International Journal of Engineering Practical Research 4, no 1 (2015) : 38–41. http://dx.doi.org/10.12783/ijepr.2015.0401.08.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
36

Yang, Li. « Teaching database security and auditing ». ACM SIGCSE Bulletin 41, no 1 (4 mars 2009) : 241–45. http://dx.doi.org/10.1145/1539024.1508954.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Sarmah, Simanta Shekhar. « Database Security –Threats & ; Prevention ». International Journal of Computer Trends and Technology 67, no 5 (25 mai 2019) : 46–53. http://dx.doi.org/10.14445/22312803/ijctt-v67i5p108.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Maheshwari, Anil. « Database Security for the Web ». Information Systems Management 16, no 2 (mars 1999) : 85–88. http://dx.doi.org/10.1201/1078/43188.16.2.19990301/31181.13.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Jajodia, Sushil, et Duminda Wijesekera. « Security in Federated Database Systems ». Information Security Technical Report 6, no 2 (juin 2001) : 69–79. http://dx.doi.org/10.1016/s1363-4127(01)00208-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Highland, Esther H. « An introduction to database security ». Computers & ; Security 7, no 3 (juin 1988) : 329. http://dx.doi.org/10.1016/0167-4048(88)90104-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Avant, Deborah, et Kara Kingma Neu. « The Private Security Events Database ». Journal of Conflict Resolution 63, no 8 (30 janvier 2019) : 1986–2006. http://dx.doi.org/10.1177/0022002718824394.

Texte intégral
Résumé :
Since the 1990s, the private provision of military and security services has become a common feature of local, national, and transnational politics. The prevalence of private security has generated important questions about its consequences, but data to answer these questions are sparse. In this article, we introduce the Private Security Events Database (PSED) that traces the involvement of private military and security companies (PMSCs) in events in Africa, Latin America, and Southeast Asia from 1990 to 2012. We describe the PSED project, highlight its descriptive findings, conduct a replication and reanalysis of Akcinaroglu and Radziszewski’s contract data in Africa, and compare the two databases’ coverage of Sierra Leone from 1991 to 1997. Our analysis demonstrates new insights into the relationship between PMSCs and civil war duration, confirming a correlation between PMSC presence and shorter conflicts, but questioning the logic Akcinaroglu and Radziszewski propose. It also points to a number of productive paths for future research.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Ma, Cai Xia, Wei Zhang, Zhi Gang Zhang et Yan Min Wang. « Oracle Database Security and Protection ». Applied Mechanics and Materials 571-572 (juin 2014) : 586–90. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.586.

Texte intégral
Résumé :
Database security is the protection of the database date, which can prevent the leakage, alteration, destruction of the information caused by the unauthorized user use the database .Those protective measures usually include: authentication, access control, access control, database backup and recovery, and security auditing.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Bertino, Elisa, Sushil Jajodia et Pierangela Samarati. « Database security : Research and practice ». Information Systems 20, no 7 (novembre 1995) : 537–56. http://dx.doi.org/10.1016/0306-4379(95)00029-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Margaret Dumebi Okpor, Kizito Eluemunor Anazia et Daniel Ukpenusiowho. « A novel hybrid database security management technique ». International Journal of Science and Research Archive 11, no 2 (30 avril 2024) : 1555–65. http://dx.doi.org/10.30574/ijsra.2024.11.2.0652.

Texte intégral
Résumé :
Since the advent of the internet and the digitization of information, more individuals and organizations have gained access to the internet, leading to a significant expansion in the size of our database systems. These databases are relied upon for day-to-day activities by individuals and organizations. Furthermore, the advancements in technology have increased the vulnerability of database management systems and enforcing adequate database security measures is of paramount importance to individuals and organizations. In this study, we deployed a hybrid approach to database security system that integrates two techniques: dynamic time-warping algorithm and voice recognition methods. The implementation follows Object-Oriented Analysis and Design procedures, utilizing SQL Management Studio 2014 for the backend and ASP.NET C# for the frontend. Our hybrid approach demonstrates enhanced database security compared to previously employed authentication measures.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Stenin, Dmitriy, Natalya Stenina, Arman Akanov et Kakim Sagindikov. « Digitalization and Innovative Development of Mining Processes ». E3S Web of Conferences 105 (2019) : 03012. http://dx.doi.org/10.1051/e3sconf/201910503012.

Texte intégral
Résumé :
This article discusses the issues of digitalization and using of information technologies, and in particular databases at all stages of the technological process of mining. In addition, the paper proposes options for protection against some of the possible attacks and information protection using countermeasures and control methods that exist at the present time. Database security is an important approach for planning and decision-making clear the security requirements of the database. Database security, especially for an industry such as mining, is a very important issue for companies. With increasing complexity of the databases, we may encounter with more complex problems related to information security.
Styles APA, Harvard, Vancouver, ISO, etc.
46

S R V Satish, Karuturi. « Database Security Issues and Challenges in Cloud Computing ». International Journal on Recent and Innovation Trends in Computing and Communication 11, no 11 (5 avril 2024) : 937–43. http://dx.doi.org/10.17762/ijritcc.v11i11.10396.

Texte intégral
Résumé :
The majority of enterprises have recently enthusiastically embraced cloud computing, and at the same time, the database has moved to the cloud. This cloud database paradigm can lower data administration expenses and free up new business to concentrate on the product that is being delivered. Furthermore, issues with scalability, flexibility, performance, availability, and affordability can be resolved with cloud computing. Security, however, has been noted as posing a serious risk to cloud databases and has been essential in fostering public acceptance of cloud computing. Several security factors should be taken into account before implementing any cloud database management system. These features comprise, but are not restricted to, data privacy, data isolation, data availability, data integrity, confidentiality, and defense against insider threats. In this paper, we discuss the most recent research that took into account the security risks and problems associated with adopting cloud databases. In order to better comprehend these problems and how they affect cloud databases, we also provide a conceptual model. Additionally, we look into these problems to the extent that they are relevant and provide two instances of vendors and security features that were used for cloud-based databases. Finally, we provide an overview of the security risks associated with open cloud databases and suggest possible future paths.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Maulana, Dimas Krisna, Sunilfa Maharani Tanjung, Reni Septiani Ritonga et Ali Ikhwan. « Penerapan Kriptografi Vigenere Cipher Pada Kekuatan Kata Sandi ». Jurnal Sains dan Teknologi (JSIT) 3, no 1 (15 janvier 2023) : 47–52. http://dx.doi.org/10.47233/jsit.v3i1.483.

Texte intégral
Résumé :
One of the methods of securing information systems that is commonly known by many people is passwords. Without realizing it, passwords have an important role in securing information that is confidential. In some applications related to software, such as cellphones, ATM cards, and others. There is also a security system that functions similarly to a password. commonly known as a PIN Code. Although it only consists of numbers, its use is the same as a password, which is to secure information. The stored information is usually digital or database-based. Password security aims to secure a password stored in the database, the password needs to be secured because if the password is known by unauthorized parties or who are not entitled then important and other data will be stolen. The password that is secured is a password that is used daily, be it email passwords, social media, databases, operating systems on the device and others into the database. vigenere cipher algorithm to encode the password in a database. The result of this test is that password security is carried out based on the vigenere cipher method using a visual studio application and utilizing a Database with a MySQL application. The end result used is the result of the security process with the result key having no resemblance to the original record. Formation of keys based on user decisions. It is worth paying attention that the key should not be forgotten.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Hashim, Hassan Bediar. « Challenges and Security Vulnerabilities to Impact on Database Systems ». Al-Mustansiriyah Journal of Science 29, no 2 (17 novembre 2018) : 117. http://dx.doi.org/10.23851/mjs.v29i2.332.

Texte intégral
Résumé :
Abstract A lot of institutions depends at present on the systems database operations and their daily activities, thus providing a means for the maintenance of permanent data can refer to it at any time, as well as to search and to modify the data easily. in this paper to determine the security challenges in the databases, and requirements necessary to address those challenges in the data value to provide security base, and to determine the security rules and know the weaknesses that can be exploited any information in a manner not allowed, when he must protect the database to make sure of the following purposes: confidentiality, integrity and continuity. One of the solutions used in this research to protect databases, and encryption of sensitive data, and adjust the system databases, and updates the database systems and we review some of the ways to address these challenges in the security databases.
Styles APA, Harvard, Vancouver, ISO, etc.
49

KEKÜL, Hakan, Burhan ERGEN et Halil ARSLAN. « Estimating Missing Security Vectors in NVD Database Security Reports ». International Journal of Engineering and Manufacturing 12, no 3 (8 juin 2022) : 1–13. http://dx.doi.org/10.5815/ijem.2022.03.01.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
50

Yesin, Vitalii, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura et Stanislaw A. Rajba. « Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model ». Applied Sciences 11, no 23 (25 novembre 2021) : 11175. http://dx.doi.org/10.3390/app112311175.

Texte intégral
Résumé :
Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured. To solve this challenge, the authors of the paper enhanced the Clements–Hoffman model, determined the integral security metric and, on this basis, developed a technique for evaluating the security of relational databases. The essence of improving the Clements–Hoffmann model is to expand it by including a set of object vulnerabilities. Vulnerability is considered as a separate objectively existing category. This makes it possible to evaluate both the likelihood of an unwanted incident and the database security as a whole more adequately. The technique for evaluating the main components of the security barriers and the database security as a whole, proposed by the authors, is based on the theory of fuzzy sets and risk. As an integral metric of database security, the reciprocal of the total residual risk is used, the constituent components of which are presented in the form of certain linguistic variables. In accordance with the developed technique, the authors presented the results of a quantitative evaluation of the effectiveness of the protection of databases built on the basis of the schema with the universal basis of relations and designed in accordance with the traditional technology of relational databases.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie