Results 21 to 30 of about 967,845 (210)

Multimedia Flavor in Directory Services Environment [PDF]

open access: yesInformatică economică, 2009
The present article aims to present the extended functionality of LDAP based systems (known as Directory Services) of handling multimedia information such as photographs. The most frequently used are JPEG encoded photos.
Emanuil REDNIC, Andrei TOMA
doaj  

A Cryptosystem for Database Security Based on TSFS Algorithm

open access: yesمجلة بغداد للعلوم, 2020
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used.
Saad Abdulkareem Abdulameer   +2 more
doaj   +1 more source

ANALYZING CLIENT-SIDE ENCRYPTION IMPLEMENTED IN CRYPTDB

open access: yesCyberspace, 2018
Client side encryption has become one of the choice for data security in outsourced database as it is believed to provide more security than the server side encryption.
Mira Maisura
doaj   +1 more source

Quantum Private Queries: security analysis

open access: yes, 2008
We present a security analysis of the recently introduced Quantum Private Query (QPQ) protocol. It is a cheat sensitive quantum protocol to perform a private search on a classical database.
Giovannetti, Vittorio   +2 more
core   +1 more source

Efficient Database Generation for Data-driven Security Assessment of Power Systems

open access: yes, 2019
Power system security assessment methods require large datasets of operating points to train or test their performance. As historical data often contain limited number of abnormal situations, simulation data are necessary to accurately determine the ...
Chatzivasileiadis, Spyros   +3 more
core   +1 more source

Proposed Method to Prevent SQL Injection Attack

open access: yesIraqi Journal for Computers and Informatics, 2016
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj   +1 more source

Secure anonymous database search [PDF]

open access: yesProceedings of the 2009 ACM workshop on Cloud computing security, 2009
There exist many large collections of private data that must be protected on behalf of the entities that hold them or the clients they serve. However, there are also often many legitimate reasons for sharing that data in a controlled manner. How can two parties decide to share data without prior knowledge of what data they have?
Raykova, Mariana Petrova   +3 more
openaire   +2 more sources

Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database

open access: yes, 2013
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana   +2 more
core   +1 more source

Digitalization and Innovative Development of Mining Processes [PDF]

open access: yesE3S Web of Conferences, 2019
This article discusses the issues of digitalization and using of information technologies, and in particular databases at all stages of the technological process of mining.
Stenin Dmitriy   +3 more
doaj   +1 more source

Strong and Provably Secure Database Access Control

open access: yes, 2015
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy