Results 21 to 30 of about 967,845 (210)
Multimedia Flavor in Directory Services Environment [PDF]
The present article aims to present the extended functionality of LDAP based systems (known as Directory Services) of handling multimedia information such as photographs. The most frequently used are JPEG encoded photos.
Emanuil REDNIC, Andrei TOMA
doaj
A Cryptosystem for Database Security Based on TSFS Algorithm
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used.
Saad Abdulkareem Abdulameer +2 more
doaj +1 more source
ANALYZING CLIENT-SIDE ENCRYPTION IMPLEMENTED IN CRYPTDB
Client side encryption has become one of the choice for data security in outsourced database as it is believed to provide more security than the server side encryption.
Mira Maisura
doaj +1 more source
Quantum Private Queries: security analysis
We present a security analysis of the recently introduced Quantum Private Query (QPQ) protocol. It is a cheat sensitive quantum protocol to perform a private search on a classical database.
Giovannetti, Vittorio +2 more
core +1 more source
Efficient Database Generation for Data-driven Security Assessment of Power Systems
Power system security assessment methods require large datasets of operating points to train or test their performance. As historical data often contain limited number of abnormal situations, simulation data are necessary to accurately determine the ...
Chatzivasileiadis, Spyros +3 more
core +1 more source
Proposed Method to Prevent SQL Injection Attack
the internet and its websites have huge using these days. These webs may have sensitive and secret information like military information, financial information and other important information that transfer through the networks.
Makera Aziz, Dena Ahmed
doaj +1 more source
Secure anonymous database search [PDF]
There exist many large collections of private data that must be protected on behalf of the entities that hold them or the clients they serve. However, there are also often many legitimate reasons for sharing that data in a controlled manner. How can two parties decide to share data without prior knowledge of what data they have?
Raykova, Mariana Petrova +3 more
openaire +2 more sources
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data security in web application has become very crucial. Ever increasing on line and real time transaction services have led to manifold rise in the problems associated with the ...
Chougule, Archana +2 more
core +1 more source
Digitalization and Innovative Development of Mining Processes [PDF]
This article discusses the issues of digitalization and using of information technologies, and in particular databases at all stages of the technological process of mining.
Stenin Dmitriy +3 more
doaj +1 more source
Strong and Provably Secure Database Access Control
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints.
Basin, David +2 more
core +1 more source

