The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
In a clear contrast with the phenomenal growth of Web database applications, access control issues related to data stored in the back-end databases have largely been neglected. Current approaches to access control on databases do not fit web databases because they are mostly based on individual user identities. In this paper, we propose (RBAC+), a dynamic access control model to enforce fine-grained...
Accuracy and integrity is an important basis for vulnerability analysis and research. A vulnerability, which based on CVE standard, has more integrated properties, and collects several professional vulnerability databases' information, has been given, in order to ensure the accuracy and Authoritative of the source. Simultaneously, unifies the naming vulnerability, consummates the vulnerability information,...
In recent years, web application security has become the primary discussion for security experts, as application attacks are constantly on rise and posing new risks for organizations. Several trends have emerged lately in the attacks launched against Web application. The implementation of International security standard is to minimize the security failures and to mitigate their consequences. The aim...
Database management systems (DBMS), the central component of many computers applications, are typically immersed in very complex environments. Protecting the DBMS from security attacks requires evaluating a long list of complex configuration characteristics that may impact, in a variety of ways, the applications and people that interact with the database system. Effectively, understanding the impact...
Database Management Systems (DBMS) are usually immersed in a so complex environment that assessing the security impact of any particular configuration choice is an extremely hard task. DBMS configuration untrustworthiness can be defined as a measure of how much one should distrust a given configuration to be able to prevent the manifestation of the most common security threats as real attacks. In...
Many Websites on the Internet are based on database, especially Websites which use database to display the pages actively such as ASP, PHP and JSP. However, because of SQL attack, people pay much attention to the security of database on the Internet. Different from many protection systems deployed between Web servers and Internet, this article designed a database protection system between Web server...
The following topics are dealt with: databases; algorithms; Web applications; e-technology; real time systems; artificial intelligence and applications; software engineering; networking; security; information retrieval; image processing; multiagent; genetic algorithms; signal processing; pattern recognition and applications; neural networks; data mining; parallel and distributed computing; software...
The following topics are dealt with: data mining; genetic algorithm; software engineering; Web applications; information management; data management; wireless networks; databases; neural networks; ad hoc networks; real time systems; social network; security; multimedia; multi-agent system; artificial intelligence; distributed systems; parallel systems.
Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiality, privacy and integrity of data is a major issue for the security of database systems. Recent high profile data thefts have shown that perimeter defenses are insufficient to secure sensitive data. This paper studies security...
The paper describes the development smart attendance system (SAS) that will take an attendance by using information extracted from the RFID database handling system. In order to have complete system functionality, smart attendance system is needed to integrate with RFID database handling system. SAS will fetch the appropriate data from RFID database in order to execute the attendance taking process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.