Results 41 to 50 of about 967,845 (210)

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

open access: yes, 2015
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D.   +8 more
core   +1 more source

Intelligent intrusion detection in low power IoTs [PDF]

open access: yes, 2016
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali   +3 more
core   +1 more source

VRS-DB: preserve confidentiality of users’ data using encryption approach

open access: yesDigital Communications and Networks, 2021
We focus on security and privacy problems within a cloud database framework, exploiting the DataBase as a Service (DBaaS). In this framework, an information proprietor drives out its information to a cloud database professional company.
J.S. Rauthan, K.S. Vaisla
doaj   +1 more source

Enhancing Design and Authentication Performance Model: A Multilevel Secure Database Management System

open access: yesFuture Internet
Multilevel security (MLS) is particularly intended to secure information against unauthorized access. An MLS security DBMS allows users with different security levels to access and share a database.
Hemin Sardar Abdulla, Aso M. Aladdin
doaj   +1 more source

Security Architecture for a Secure Database on Android

open access: yesIEEE Access, 2018
As mobile devices are increasingly used in various daily activities, they have become a movable storage that stores various personal/business information of users. Most mobile OSes, including Android, store personal data in databases and provide APIs for
Jin Hyung Park   +3 more
doaj   +1 more source

Securing Databases from Probabilistic Inference

open access: yes, 2017
Databases can leak confidential information when users combine query results with probabilistic data dependencies and prior knowledge. Current research offers mechanisms that either handle a limited class of dependencies or lack tractable enforcement ...
Basin, David   +2 more
core   +1 more source

Database anomaly detection model based on mining object-condition association rules

open access: yesTongxin xuebao, 2009
A database anomaly detection model based on mining object-condition association rules(OCAR) was proposed.Through analyzing and formalizing the only maximum conditional expression of SQL statements with WHERE clause, the object-condition association rule ...
DAI Hua   +3 more
doaj  

Analysis for the Evaluation and Security Management of a Database in a Public Organization to Mitigate Cyber Attacks

open access: yesIEEE Access, 2020
In data handling, security and privacy are essential for database administrators and users that own their information. Information about security models or architectures was analyzed for databases that minimize Cyber Attacks. The problem is that security
Segundo Moises Toapanta   +3 more
doaj   +1 more source

Income distribution patterns from a complete social security database

open access: yes, 2012
We analyze the income distribution of employees for 9 consecutive years (2001-2009) using a complete social security database for an economically important district of Romania.
Abul-Magd   +39 more
core   +1 more source

Security Risk and Preventive Measures of Multimedia Database System under Remote Control of Network Robot

open access: yesJournal of Robotics, 2023
The rapid development of network technology makes the world enter a new era, but it also brings a variety of severe information security problems, which makes the network security more and more important. Based on the existing literature and information,
Wenyan Deng, Pengfei Yan
doaj   +1 more source

Home - About - Disclaimer - Privacy