Teses / dissertações sobre o tema "Database security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Database security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Sakhi, Imal. "Database security in the cloud". Thesis, KTH, Data- och elektroteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102955.
Texto completo da fonteChung, Sun S. "Anti-Tamper Databases: Querying Encrypted Databases". online version, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=case1136677144.
Texto completo da fonteWong, Wai-kit, e 王偉傑. "Security and computability in database applications". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B4607787X.
Texto completo da fonteKong, Yibing. "Security and privacy model for association databases". Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20031126.142250/index.html.
Texto completo da fonteHoeppner, Joseph A. "A Comparison of Cloud Computing Database Security Algorithms". UNF Digital Commons, 2015. http://digitalcommons.unf.edu/etd/596.
Texto completo da fonteChen, Yu. "Protection of database security via collaborative inference detection". Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132501&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Texto completo da fonteBernagozzi, Stefano. "Range Queries on an encrypted outsourced database". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/10907/.
Texto completo da fontePokorný, Tomáš. "Bezpečnostní aspekty implementace databázových systémů". Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17064.
Texto completo da fonteHo, Sze-lok, e 何思樂. "Technical solutions for conducting investigations in digital age". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B48521802.
Texto completo da fontepublished_or_final_version
Computer Science
Master
Master of Philosophy
Zhang, Ye, e 张叶. "Query and access control over encrypted databases". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45689726.
Texto completo da fontePradhan, Sayli H. "User Interface Design, Database Connectivity, and Security in Fortified Cards". Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10638557.
Texto completo da fonteThe current debit and credit cards have inherent security flaws. The solution to this problem is the use of Fortified Cards, which differ from the credit or debit cards due to the embedded Quick Response (QR) code. With a combination of a user?s International Mobile Equipment Identity (IMEI) number and the QR code on the Fortified Card, any transaction can be performed in a more secure way, thereby reducing security frauds. In this report, three modules are explained, namely: User Interface (UI) design, database (backend) connectivity, and security. System Vision is used to explain the entire process of the transaction. The Android application uses the backend database in order to access and verify a user?s bank details. A few encryption algorithms were studied and Advanced Encryption Standard (AES) was chosen for implementation. The application was successful in transferring the transaction amount from the customer?s account to the vendor?s account.
Porter, Paul A. "Trust Negotiation for Open Database Access Control". Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Texto completo da fonteNeophytou, Andonis. "Computer security : data control and protection". Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.
Texto completo da fonteDepartment of Computer Science
Zhang, Xiao Meng M. Eng Massachusetts Institute of Technology. "Designing a SQL query rewriter to enforce database Row Level Security". Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106398.
Texto completo da fonteThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 73-74).
This thesis presents the design and implementation of Row Level Security, a fine-grained access control mechanism built on top of a database-agnostic data sharing platform called DataHub. Existing access control mechanisms for database systems are typically coarse-grained, in the sense that users are either given access to an entire database table or nothing at all. This is problematic with the rise in popularity of data sharing, where users want to share subsets of data in a table with others, rather than the entire table. Row Level Security addresses this problem by allowing users to create security policies that define subsets of data others are able to access, and enforces security policies through a query rewrite mechanism. This work presents Row Level Security, as well as an evaluation of its performance overhead costs and ease of use.
by Xiao Meng Zhang.
M. Eng.
Hong, Seng-Phil. "Data base security through simulation". Virtual Press, 1994. http://liblink.bsu.edu/uhtbin/catkey/902465.
Texto completo da fonteDepartment of Computer Science
Ofori-Duodu, Michael Samuel. "Exploring Data Security Management Strategies for Preventing Data Breaches". ScholarWorks, 2019. https://scholarworks.waldenu.edu/dissertations/7947.
Texto completo da fonteCui, Yingjie. "A study on privacy-preserving clustering". Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B4357225X.
Texto completo da fontePavlou, Kyriacos Eleftheriou. "Database Forensics in the Service of Information Accountability". Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/265817.
Texto completo da fonteAiello, Brady Benjamin. "Analyzing Global Cyber Attack Correlates Through an Open Database". DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.
Texto completo da fonteGaadingwe, Tshepo Gaadingwe. "A critical review of the IFIP TC11 Security Conference Series". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/507.
Texto completo da fonteBai, Yun. "On formal specification of authorization policies and their transformations : thesis /". View thesis View thesis, 2000. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030612.090157/index.html.
Texto completo da fonte"A thesis submitted for the degree of Doctor of Philosophy at University of Western Sydney - Nepean." "September 2000." Bibliography : leaves 141-150.
Nguyen, Anthony. "Database system architecture for fault tolerance and disaster recovery". [Denver, Colo.] : Regis University, 2009. http://adr.coalliance.org/codr/fez/view/codr:152.
Texto completo da fonteTao, Jia. "A model for storage and query of cascading beliefs in multilevel security database". [Ames, Iowa : Iowa State University], 2006.
Encontre o texto completo da fonteBruner, William W. "National Security Implications of Inexpensive Space Access". Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Texto completo da fonteRaybourn, Tracey. "Bucketization Techniques for Encrypted Databases: Quantifying the Impact of Query Distributions". Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1363638271.
Texto completo da fonteHuber, Matthias Christoph [Verfasser], e J. [Akademischer Betreuer] Müller-Quade. "Provable and Practical Security for Database Outsourcing / Matthias Christoph Huber. Betreuer: J. Müller-Quade". Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1113109289/34.
Texto completo da fonteReinsmith, Lee, e Steven Surber. "A PC Database and GUI for Telemetry Data Reduction". International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608316.
Texto completo da fonteThe Telemetry Definition and Processing (TDAP II) application is a PC-based software tool that meets the varied needs - both now and into the 21st century - of instrumentation engineers, data analysts, test engineers, and project personnel in the Test and Evaluation (T&E) community. TDAP II uses state-of-the-art commercial software technology that includes a Microsoft Access 97Ô database and a Microsoft Visual BasicÔ Graphical User Interface (GUI) for users to view and navigate the database. Developed by the Test and Analysis Division of the 96th Communications Group for the tenants of the Air Armament Center (AAC), Eglin AFB Florida, TDAP II provides a centralized repository for both aircraft and weapons instrumentation descriptions and telemetry EU conversion calibrations. Operating in a client/server environment, TDAP II can be effectively used on a small or large network as well as on both a classified or unclassified Intranet or Internet. This paper describes the components and design of this application, along with its operational flexibility and varied uses resulting from the chosen commercial software technology.
Perry, Sonja Michele. "An integrated intranet and dynamic database application for the Security Manager at Naval Postgraduate School". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FPerry.pdf.
Texto completo da fonteThesis advisor(s): Randy L. Borchardt, Dan C. Boger. Includes bibliographical references (p. 67). Also available online.
Shah, Rahul Arvind. "Vulnerability assessment of Java bytecode". Auburn, Ala., 2005. http://repo.lib.auburn.edu/Send%2012-16-07/SHAH_RAHUL_44.pdf.
Texto completo da fonteCui, Yingjie, e 崔英杰. "A study on privacy-preserving clustering". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B4357225X.
Texto completo da fonteDaehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /". Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Texto completo da fonteWang, Shujing. "Logic programming based formal representations for authorization and security protocols". Thesis, View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Texto completo da fonteKumka, David Harold. "Quantifying Performance Costs of Database Fine-Grained Access Control". NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/204.
Texto completo da fontePoe, Gary A. "Privacy in Database Designs: A Role Based Approach". Scholar Commons, 2007. https://scholarcommons.usf.edu/etd/454.
Texto completo da fonteMiller, William B. "Classifying and Cataloging Cyber-Security Incidents Within Cyber-Physical Systems". BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4345.
Texto completo da fonteWang, Shujing. "Logic programming based formal representations for authorization and security protocols". View thesis, 2008. http://handle.uws.edu.au:8081/1959.7/13380.
Texto completo da fonteA thesis submitted for the degree of Doctor of Philosophy to the University of Western Sydney, College of Health and Science, School of Computing and Mathematics. Includes bibliography.
Maphakela, Madidimalo Rabbie. "A model for legal compliance in the South African banking sector : an information security perspective". Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/725.
Texto completo da fonteLukanič, Michal. "Bezpečnost v databázi Oracle". Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-72438.
Texto completo da fonteChmel, Marek. "Informační systém pro školící centrum". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2009. http://www.nusl.cz/ntk/nusl-222276.
Texto completo da fonteBai, Yun. "On formal specification of authorization policies and their transformations : thesis". Thesis, View thesis View thesis, 2000. http://handle.uws.edu.au:8081/1959.7/564.
Texto completo da fonteHermansson, Tobias. "FiLDB : An Architecture for Securely Connecting Databases to the Internet". Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-625.
Texto completo da fonteToday more and more Information systems exist and they contain more and more information. Many information systems contain information about people that is secret or sensitive. Such information should not be allowed to leak from a database. This problem grows more and more as databases are made available via the Internet.
There have been a number of publicised occasions where hackers have passed security barriers and got information that is not intended to be publicly available. There have also been cases where the administrators of systems have made mistakes, so that classified information was published on the Internet.
The FiLDB architecture uses existing technology together with new components to provide an environment in which databases can be connected to the Internet without losing security. Two databases, with physical separation between them, are used as a security measure. Secret information is stored only in an internal database, which is separated from the Internet. An external database contains information which is to be used from the Internet, and hence sensitive information is not stored in this database.
Motara, Yusuf Moosa. "File integrity checking". Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1007701.
Texto completo da fonteKalakota, Govardhan Reddy. "Hierarchical Partition Based Design Approach for Security of CAN Bus Based Automobile Embedded System". University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535382487070314.
Texto completo da fonteNaujokas, Tomas. "Duomenų prieinamumo ir saugumo duomenų bazėse metodiniai nurodymai". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_103132-65944.
Texto completo da fonteThis work destination was to create requirements based on data security and availability method choosing and their combination methodology. Introduce requirements based on complex security model. Eliminate information lack of complex security. In work analyzed and compared complex security solutions of famous the word security specialists. Accomplished system vulnerability analysis and systematized information. During the work revealed most important vulnerabilities, explain how it works and how correctly secure of them. In this research described security model of complex security, which later detailed as smaller part of model. Complex security model were used at nowadays most popular combined information system. For research were used Microsoft Windows Server 2008 and Microsoft SQL Server 2008. Created methodology is useful then necessary to test existing or creating new configuration of system.
Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge". International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.
Texto completo da fonteAs organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and tokenization are impacting cloud security, their effect on telemetry post-processing will also be examined. An architecture will be described detailing how these data security tools can be utilized to make telemetry post-processing environments in the cloud more robust.
Winner-Leoni, Melissa D. "An Investigation of the Security Designs of a Structured Query Language (SQL) Database and its Middleware Application and their Secure Implementation within Thinclient Environments". [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/MWinnerLeoni2008.pdf.
Texto completo da fonteKalibjian, Jeff. "Data Security Architecture Considerations for Telemetry Post Processing Environments". International Foundation for Telemetering, 2017. http://hdl.handle.net/10150/626950.
Texto completo da fonteSubekti, Mohammad, e Widhya Bagya Prawiraatmadja. "A prototype database management system for the Budgeting System of the Department of Defense and security of the Republic of Indonesia". Thesis, Monterey, California. Naval Postgraduate School, 1985. http://hdl.handle.net/10945/21512.
Texto completo da fonteBrzobohatá, Veronika. "Vytvoření help desku SW nástroje pro řízení kybernetické bezpečnosti". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444576.
Texto completo da fonteMiklau, Gerome. "Confidentiality and integrity in distributed data exchange /". Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/7011.
Texto completo da fonte