Results 281 to 290 of about 967,964 (329)
Some of the next articles are maybe not open access.
Incorporating database security courseware into a database security class
Proceedings of the 4th annual conference on Information security curriculum development, 2007Data security is a growing concern and it seems timely to develop and incorporate database security courses into programs of study in the computing disciplines. This paper describes a recently developed course in database security and introduces a set of animations that might be incorporated to bring about more effective instruction and enhance student
Mario Guimaraes +2 more
openaire +1 more source
Medical Database Security Policies
Methods of Information in Medicine, 1993AbstractDatabase security plays an important role in the overall security of medical information systems. Security does not only involve fundamental ethical principles such as privacy and confidentiality, but is also an essential prerequisite for effective medical care.
openaire +2 more sources
Information and Software Technology, 2005
Security is an important issue that must be considered as a fundamental requirement in information systems development, and particularly in database design. Therefore security, as a further quality property of software, must be tackled at all stages of the development.
Eduardo Fernández-Medina +1 more
openaire +1 more source
Security is an important issue that must be considered as a fundamental requirement in information systems development, and particularly in database design. Therefore security, as a further quality property of software, must be tackled at all stages of the development.
Eduardo Fernández-Medina +1 more
openaire +1 more source
Medical database security evaluation
Medical Informatics, 1993Users of medical information systems need confidence in the security of the system they are using. They also need a method to evaluate and compare its security capabilities. Every system has its own requirements for maintaining confidentiality, integrity and availability.
openaire +2 more sources
2014
In the last few years, the wide availability of computational and storage resources at low prices has substantially changed the way in which data are managed, stored, and disseminated. As testified by the growing success of data outsourcing, cloud computing, and services for sharing personal information (e.g., Flickr, YouTube, Facebook), both ...
S. De Capitani di Vimercati +3 more
openaire +2 more sources
In the last few years, the wide availability of computational and storage resources at low prices has substantially changed the way in which data are managed, stored, and disseminated. As testified by the growing success of data outsourcing, cloud computing, and services for sharing personal information (e.g., Flickr, YouTube, Facebook), both ...
S. De Capitani di Vimercati +3 more
openaire +2 more sources
Database Security and Security Patterns
2012There are so many threats to your security that it is essential to remain ever vigilant-without ending up with your server in a bunker of lead wearing a tinfoil hat protecting data by keeping it completely inaccessible to any human eyes. Business needs connectivity to customers, and customers need connectivity to their data. Security is one of the most
Louis Davidson, Jessica Moss
openaire +1 more source
2019
Onset of cloud computing allowed various IT services to be outsourced to cloud service providers (CSP). This includes the management and storage of users’ structured or unstructured data called Database as a Service (DBaaS). However, users need to trust the CSP to protect their data, which is inherent in all cloud-based services.
Ayantika Chatterjee, Khin Mi Mi Aung
openaire +1 more source
Onset of cloud computing allowed various IT services to be outsourced to cloud service providers (CSP). This includes the management and storage of users’ structured or unstructured data called Database as a Service (DBaaS). However, users need to trust the CSP to protect their data, which is inherent in all cloud-based services.
Ayantika Chatterjee, Khin Mi Mi Aung
openaire +1 more source
2007
Geospatial data refers to the resources associated with location information represented by longitude and latitude. Its increasing availability and the tools to integrate and visualize the various types of data facilitate conducting sophisticated analysis and discovering hidden patterns. Therefore, uncontrolled dissemination of geospatial data may have
Soon Ae Chun, Vijayalakshmi Atluri
openaire +1 more source
Geospatial data refers to the resources associated with location information represented by longitude and latitude. Its increasing availability and the tools to integrate and visualize the various types of data facilitate conducting sophisticated analysis and discovering hidden patterns. Therefore, uncontrolled dissemination of geospatial data may have
Soon Ae Chun, Vijayalakshmi Atluri
openaire +1 more source

