Results 31 to 40 of about 967,845 (210)

Efficient and secure ranked multi-keyword search on encrypted cloud data [PDF]

open access: yes, 2012
Information search and document retrieval from a remote database (e.g. cloud server) requires submitting the search terms to the database holder. However, the search terms may contain sensitive information that must be kept secret from the database ...
Orencik, Cengiz   +3 more
core   +1 more source

Study on Database Management System Security Issues

open access: yesJOIV: International Journal on Informatics Visualization, 2017
The study is about the security system of database management (DBMS) and proposed method. Information is an essential element in database management system where the users trust service providers will have a secure system to protect and prevent their ...
Mohd Amin Mohd Yunus   +3 more
doaj   +1 more source

Application of Chaotic Neural Network for Authentication using the Database [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2014
In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding  by entering values to the artificial neural network for training as well as hide
Ammar Yaseen Abd Alazeez
doaj   +1 more source

SoK: Cryptographically Protected Database Search [PDF]

open access: yes, 2017
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches.
Cunningham, Robert K.   +8 more
core   +1 more source

Provably-secure symmetric private information retrieval with quantum cryptography

open access: yes, 2020
Private information retrieval (PIR) is a database query protocol that provides user privacy, in that the user can learn a particular entry of the database of his interest but his query would be hidden from the data centre.
Kon, Wen Yu, Lim, Charles Ci Wen
core   +1 more source

A Novel Data Encryption Algorithm To Ensure Database Security

open access: yesActa Infologica, 2023
Many people apply technologies gradually, moving towards new progress and development. Moreover, many of us utilize database systems to assist our work management; the database contains our work or personal information, which increases the risk of losing
Sivan İbrahim   +4 more
doaj   +1 more source

Dodrant-Homomorphic Encryption for Cloud Databases using Table Lookup [PDF]

open access: yes, 2017
Users of large commercial databases increasingly want to outsource their database operations to a cloud service providers, but guaranteeing the privacy of data in an outsourced database has become the major obstacle to this move.
Schwarz, Thomas
core   +2 more sources

XML Security in Certificate Management - XML Certificator [PDF]

open access: yes, 2009
The trend of rapid growing use of XML format in data/document management system reveals that security measures should be urgently considered into next generation's data/document systems.
Cripps, Nathan, Lu, Joan
core   +1 more source

SQL Injection in LLM-Generated Queries: Systematic Analysis of Detection Gaps and Security Risks

open access: yesIEEE Access
Large language models (LLMs) are being woven into software systems at a remarkable pace. When these systems include a back-end database, LLM integration opens new attack surfaces for SQL injection (SQLi).
Eunyoung Kim, Sangkyun Lee
doaj   +1 more source

QKD-based quantum private query without a failure probability

open access: yes, 2015
In this paper, we present a quantum-key-distribution (QKD)-based quantum private query (QPQ) protocol utilizing single-photon signal of multiple optical pulses.
Gao, Fei   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy