Results 11 to 20 of about 967,845 (210)
A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities
There is an increasing demand for processing large volumes of unstructured data for a wide variety of applications. However, protection measures for these big data sets are still in their infancy, which could lead to significant security and privacy ...
Anne M. Tall, Cliff C. Zou
doaj +1 more source
Obtaining convincing evidence of database security, as the basic corporate resource, is extremely important. However, in order to verify the conclusions about the degree of security, it must be measured.
Vitalii Yesin +4 more
doaj +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources
A Review of Database Security Concepts, Risks, and Problems
Currently, data production is as quick as possible; however, databases are collections of well-organized data that can be accessed, maintained, and updated quickly.
Ramyar Abdulrahman Teimoor
doaj +1 more source
Integrated Association Rules Complete Hiding Algorithms
This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well ...
Mohamed Refaat Abdellah +3 more
doaj +1 more source
Some Potential Issues with the Security of HTML5 IndexedDB [PDF]
The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks ...
Ellman, Jeremy +2 more
core +1 more source
Practical private database queries based on a quantum key distribution protocol [PDF]
Private queries allow a user Alice to learn an element of a database held by a provider Bob without revealing which element she was interested in, while limiting her information about the other elements. We propose to implement private queries based on a
A. Jakoby +17 more
core +4 more sources
A Novel Graph-modification Technique for User Privacy-preserving on Social Networks
The growing popularity of social networks and the increasing need for publishing related data mean that protection of privacy becomes an important and challenging problem in social networks.
Seyedeh Hamideh Erfani, Reza Mortazavi
doaj +1 more source
Statistical and fuzzy approach for database security [PDF]
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on statistical and fuzzy set theories for Cumulated Anomaly, is proposed. DDM
Lu, G, Lü, K, Yi, J
core +1 more source
Enhancing Security of Databases through Anomaly Detection in Structured Workloads
In today’s world, the protection of databases in any global organization has become paramount due to the rapid growth of data and the new generations of cyber threats.
Charanjeet Dadiyala +5 more
doaj +3 more sources

