Results 271 to 280 of about 967,964 (329)
Some of the next articles are maybe not open access.

Database Security

IEEE Transactions on Software Engineering, 1978
Databases may be compromised by asking a set of queries which return only statistical information and making inferences about a specific entry from the results of the set of queries. We present methods of constructing the set of queries to compromise a database where all the queries in the set return the maximum of a set of k elements, or all queries ...
Davida, George I.   +3 more
openaire   +1 more source

Secure databases

ACM Transactions on Database Systems, 1979
Users may be able to compromise databases by asking a series of questions and then inferring new information from the answers. The complexity of protecting a database against this technique is discussed here.
David Dobkin   +2 more
openaire   +1 more source

Medical Database Security

1990
Medical database2) security aims, generally speaking, at high availability, accuracy, integrity and consistency of stored data, as well as at medical professional secrecy and confidentiality (oath of Hippokrates), and privacy as the individuals constitutional right of ‘informational self-determination’ [Co74, Bvg83], in particular to ...
openaire   +2 more sources

Database Security and Statistical Database Security

2009
In this article we will present an introduction to issues relevant to database security and statistical database security. We will briefly cover various security models, elaborate on how data analysis in data warehouses (DWH) might compromise an individual’s privacy, and explain which safeguards can be used to prevent attacks.
openaire   +1 more source

Enhancing medical database security

Journal of Medical Systems, 1994
A methodology for the enhancement of database security in a hospital environment is presented in this paper which is based on both the discretionary and the mandatory database security policies. In this way the advantages of both approaches are combined to enhance medical database security.
G, Pangalos, M, Khair, L, Bozios
openaire   +2 more sources

Security Policies for Databases

IFAC Proceedings Volumes, 1992
Abstract This paper discusses advantages and disadvantages of security policies for databases. While database security will be defined by using a broader perspective main attention is given to access control models preventing a database from unauthorized disclosure or modification of information.
G. Pernul, A.M. Tjoa
openaire   +1 more source

Database and database application security

Proceedings of the 14th annual ACM SIGCSE conference on Innovation and technology in computer science education, 2009
This paper focuses on the emerging importance of database and application security, textbooks and other supplementary materials to teach these topics and where to place these topics in a curriculum. The paper emphasizes 1) the growing concerns of database technologies and database applications, 2) existing books and supporting materials, and 3) and ...
Huwida E. Said   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy