Results 1 to 10 of about 4,302,718 (193)

Database Security

open access: yesAdvances in Engineering Innovation, 2023
In the modern technological tapestry, the security of database systems has burgeoned into a prominent concern for institutional frameworks. This urgency is invigorated by a dual confluence: the shifting industry paradigm which underscores the primacy of expansive data collections, coupled with the proliferation of legislative frameworks that zealously ...
Michael Kaufmann, Andreas Meier
semanticscholar   +5 more sources

A Review of Database Security Concepts, Risks, and Problems

open access: yesUHD Journal of Science and Technology, 2021
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly.
Ramyar Abdulrahman Teimoor
doaj   +2 more sources

Database Security in Private Database Clouds [PDF]

open access: yes2016 International Conference on Information Science and Security (ICISS), 2016
Cloud computing and cloud systems are very popular in today's Information Technology (IT) and systems and have grown very quickly. Cloud computing helps organizations solve increasing IT costs such as their licenses, power consumption, physical protection, by providing better standardization, higher benefit, greater performance, and quicker responses ...
Cinar, Onur   +2 more
openaire   +3 more sources

A Cryptosystem for Database Security Based on TSFS Algorithm

open access: yesمجلة بغداد للعلوم, 2020
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used.
Saad Abdulkareem Abdulameer   +2 more
doaj   +2 more sources

Analysis for the Evaluation and Security Management of a Database in a Public Organization to Mitigate Cyber Attacks

open access: yesIEEE Access, 2020
In data handling, security and privacy are essential for database administrators and users that own their information. Information about security models or architectures was analyzed for databases that minimize Cyber Attacks. The problem is that security
Segundo Moises Toapanta   +3 more
doaj   +2 more sources

Multilevel Database Security for Android Using Fast Encryption Methods [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2022
Multilevel Security (MLS) is one of the ways that protects the stored information in the computer and mobile devices. It classifies users and information into levels of security; thus, the user can access information within its level or less.
Najla AI Dabagh, Mahmood S. Mahmood
doaj   +1 more source

A new comparative study of database security [PDF]

open access: yesRevista Română de Informatică și Automatică, 2023
Data is being stored electronically increasingly more, and the importance of databases has therefore increased significantly. Given that the data collected is used for various reasons and the sensitivity of the data can differ, the importance of database
Daniel BĂRBULESCU   +2 more
doaj   +1 more source

Advancing database security: a comprehensive systematic mapping study of potential challenges

open access: yesWireless networks, 2023
The value of data to a company means that it must be protected. When it comes to safeguarding their local and worldwide databases, businesses face a number of challenges.
Asif Iqbal   +6 more
semanticscholar   +1 more source

Bibliometric Analysis of Economic, Social and Information Security Research [PDF]

open access: yesSocioEconomic Challenges, 2021
Issues of national security are of particular scientific interest because without it. It is impossible to imagine the existence of any state. Protecting the economic and social interests of the population has long been one of the prerogatives of public ...
Vladislav Novikov
doaj   +1 more source

End-to-End Database Software Security

open access: yesSoftware, 2023
End-to-end security is essential for relational database software. Most database management software provide data protection at the server side and in transit, but data are no longer protected once they arrive at the client software.
Denis Ulybyshev   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy