Results 11 to 20 of about 967,845 (210)

A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities

open access: yesApplied Sciences, 2023
There is an increasing demand for processing large volumes of unstructured data for a wide variety of applications. However, protection measures for these big data sets are still in their infancy, which could lead to significant security and privacy ...
Anne M. Tall, Cliff C. Zou
doaj   +1 more source

Technique for Evaluating the Security of Relational Databases Based on the Enhanced Clements–Hoffman Model

open access: yesApplied Sciences, 2021
Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured.
Vitalii Yesin   +4 more
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

A Review of Database Security Concepts, Risks, and Problems

open access: yesUHD Journal of Science and Technology, 2021
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly.
Ramyar Abdulrahman Teimoor
doaj   +1 more source

Integrated Association Rules Complete Hiding Algorithms

open access: yesAdvances in Electrical and Electronic Engineering, 2017
This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well ...
Mohamed Refaat Abdellah   +3 more
doaj   +1 more source

Some Potential Issues with the Security of HTML5 IndexedDB [PDF]

open access: yes, 2014
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy   +2 more
core   +1 more source

Practical private database queries based on a quantum key distribution protocol [PDF]

open access: yes, 2010
Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a
A. Jakoby   +17 more
core   +4 more sources

A Novel Graph-modification Technique for User Privacy-preserving on Social Networks

open access: yesJournal of Telecommunications and Information Technology, 2019
The growing popularity of social networks and the increasing need for publishing related data mean that protection of privacy becomes an important and challenging problem in social networks.
Seyedeh Hamideh Erfani, Reza Mortazavi
doaj   +1 more source

Statistical and fuzzy approach for database security [PDF]

open access: yes, 2007
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on statistical and fuzzy set theories for Cumulated Anomaly, is proposed. DDM
Lu, G, Lü, K, Yi, J
core   +1 more source

Enhancing Security of Databases through Anomaly Detection in Structured Workloads

open access: yesJournal of ICT Research and Applications
In today’s world, the protection of databases in any global organization has become paramount due to the rapid growth of data and the new generations of cyber threats.
Charanjeet Dadiyala   +5 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy