The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Database outsourcing is emerging as an important trend in which the data owners ship their data to external service provider. Since a service provider is not fully trusted, security and privacy are significant issues. They can be referred to as data confidentiality, user and data privacy, query assurance and secure auditing. Among them, secure auditing takes an important role to have a secure database...
Security issues are quite important in applications of Database As a Service (DAS) where data are published to the untrusted service providers by data owners. This paper is to address the problem of verifying the completeness of query results generated from the untrusted service providers in DAS applications. Existing studies on completeness verification of query results are focused on one dimensional...
Multi-level encryption method was used to encrypt the database system and encryption design method for different levels of data granularity was given, respectively taking database level, table level, recording level and field level as the objects.
Because of the password attack and the replay attack are existing comparatively serious threats for a traditional single sign-on protocol, and the most methods of this issue solving are all not paying the attention to impact on the whole system caused by unsafe client. In this regard, this study proposes an improved single sign-on protocol. Based on the traditional single sign-on protocol, it increases...
The electronic identity (eID) is being positioned to be a basic tool for identification, authentication and authorization in application domains ranging from eCommerce in private sector to eGovernance in public sector. A practical and flexible eID should be usable in both a network-connected online setting as well as in conventional offline situations. While improving security of communication and...
Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiality, privacy and integrity of data is a major issue for the security of database systems. Recent high profile data thefts have shown that perimeter defenses are insufficient to secure sensitive data. This paper studies security...
Data outsourcing or database as a service is a new paradigm for data management in which a third party service provider hosts a database as a service. The service provides data management for its customers and thus obviates the need for the service user to purchase expensive hardware and software, deal with software upgrades and hire professionals for administrative and maintenance tasks. Since using...
At present, data management systems for most small and medium-sized enterprises exist some issues, such as high cost, lack of security guarantee. This paper puts forward a public data server management system based on electronic signature technology. This system mainly adopts ASP.net and SQL Server 2000 database service technology and integrates the electronic signature (EKey) technology to achieve...
The research project aims at designing and implementing a Web based wireless mobile system security and privacy framework that is centered on the concepts of ubiquitous healthcare services provided to the patients in rural or remote areas from distant hospitals. With this system framework, a physician can securely access and carry the patient information from a mobile device, update the patient information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.