Results 41 to 50 of about 967,845 (210)
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D. +8 more
core +1 more source
Intelligent intrusion detection in low power IoTs [PDF]
Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions as they ...
Ahmadinia, Ali +3 more
core +1 more source
VRS-DB: preserve confidentiality of users’ data using encryption approach
We focus on security and privacy problems within a cloud database framework, exploiting the DataBase as a Service (DBaaS). In this framework, an information proprietor drives out its information to a cloud database professional company.
J.S. Rauthan, K.S. Vaisla
doaj +1 more source
Multilevel security (MLS) is particularly intended to secure information against unauthorized access. An MLS security DBMS allows users with different security levels to access and share a database.
Hemin Sardar Abdulla, Aso M. Aladdin
doaj +1 more source
Security Architecture for a Secure Database on Android
As mobile devices are increasingly used in various daily activities, they have become a movable storage that stores various personal/business information of users. Most mobile OSes, including Android, store personal data in databases and provide APIs for
Jin Hyung Park +3 more
doaj +1 more source
Securing Databases from Probabilistic Inference
Databases can leak confidential information when users combine query results with probabilistic data dependencies and prior knowledge. Current research offers mechanisms that either handle a limited class of dependencies or lack tractable enforcement ...
Basin, David +2 more
core +1 more source
Database anomaly detection model based on mining object-condition association rules
A database anomaly detection model based on mining object-condition association rules(OCAR) was proposed.Through analyzing and formalizing the only maximum conditional expression of SQL statements with WHERE clause, the object-condition association rule ...
DAI Hua +3 more
doaj
In data handling, security and privacy are essential for database administrators and users that own their information. Information about security models or architectures was analyzed for databases that minimize Cyber Attacks. The problem is that security
Segundo Moises Toapanta +3 more
doaj +1 more source
Income distribution patterns from a complete social security database
We analyze the income distribution of employees for 9 consecutive years (2001-2009) using a complete social security database for an economically important district of Romania.
Abul-Magd +39 more
core +1 more source
The rapid development of network technology makes the world enter a new era, but it also brings a variety of severe information security problems, which makes the network security more and more important. Based on the existing literature and information,
Wenyan Deng, Pengfei Yan
doaj +1 more source

