134,249 Hits in 3.2 sec

Research on the Enterprise Resource Management System and Auxiliary Performance Evaluation Mechanism based on Oracle Database Optimization and Security Enhancement

Lei Liu, Hua Yang, Alian Wesmmian
2017 International Journal of Future Generation Communication and Networking  
In this research, we propose the novel enterprise resource management system and the auxiliary performance evaluation mechanism based on Oracle database optimization and security enhancement.  ...  to receive the favor of many enterprises.  ...  commands to the database security.  ... 
doi:10.14257/ijfgcn.2017.10.1.12 fatcat:2fwtdgfgine6te5yhdicidzqf4

A real-time intrusion prevention system for commercial enterprise databases and file systems

2005 Proceedings of the 3rd International Workshop on Security in Information Systems   unpublished
Based on many years of Database Security Research, the proposed solution detects a wide range of specific and general forms of misuse, provides detailed reports, and has a low false-alarm rate.  ...  The proposed solution offers the ability to detect misuse and subversion through the direct monitoring of database operations inside the database host, providing an important complement to host-based and  ...  With the advent of networking, enterprise-critical applications, multi-tiered architectures and web access, approaches to security have become far more sophisticated.  ... 
doi:10.5220/0002543200940101 fatcat:lq7kl6btyngqrbumdk5fbgzp6e

From MDM to DB2: A Case Study of Security Enforcement Migration [chapter]

Nikolay Yakovets, Jarek Gryz, Stephanie Hazlewood, Paul van Run
2012 Lecture Notes in Computer Science  
The proposed migration aims to improve the security and simplify the audit of the enterprise system by enforcing information protection principles of the least privileges and the least common mechanism  ...  This work presents a case study of a migration of attributebased access control enforcement from the application to the database tier.  ...  We see several benefits of such database-level enterprise security enforcement.  ... 
doi:10.1007/978-3-642-31540-4_16 fatcat:idc47gvjvjhptaxiunpqauxppe

Building an Enterprise it Security Management System [chapter]

Meletis A. Belsis, Leonid Smalov
2003 Security and Privacy in the Age of Uncertainty  
To provide adequate protection for the modern enterprise, security architectures need to be build.  ...  The proposed prototype aims at presenting security specialists with more effective ways of managing existing security architectures implemented by the enterprise.  ...  Figure 3 Enterprise Incident History Model Implementing the proposed structure Two issues regarding deployment of a security related database are the security of the data stored and the way this data  ... 
doi:10.1007/978-0-387-35691-4_16 fatcat:ca4mnbgbojesze5yxnuxctvuc4

Cloud CRM: State-of-the-Art and Security Challenges

Amin Shaqrah
2016 International Journal of Advanced Computer Science and Applications  
Some aspects of security discussed concern on deployment the cloud CRM like: Access customers' database and control; secure data transfer over the cloud; trust among the enterprise and cloud service provider  ...  In this paper researcher emphasis on the cloud CRM themes, security threads the most concern.  ...  So the cloud CRM provider should be secure database through coherent security policy and techniques [26] .Customer database stored on the cloud must be saved private and the provider should not be able  ... 
doi:10.14569/ijacsa.2016.070405 fatcat:nhvbbp3bybfg3jofspza4rxbp4

The use of personal information webs: convergence of enterprise information sources at the point of care

Culp, Myers, Miller
2000 Proceedings. AMIA Symposium  
Each clinician is provided, with rigorous security and confidentiality measures built in, a personal web portal to our enterprise intranet.  ...  The rapid and continual expansion of readily available patient-related computerized information from multiple sources and systems within our enterprise over the last ten years has now enabled our development  ...  We have processing business information about the developed and begun implementation of these enterprise in multiple Oracle® databases.  ... 
pmid:11080029 pmcid:PMC2244126 fatcat:tnv4us4srrfrra7j7wch4fr4oi

Personal data protection as an element of management security of information

Justyna Żywiołek
2019 Multidisciplinary Aspects of Production Engineering  
The results of research on information security management in the field of personal data protection have been presented. The research was carried out on a sample of 110 enterprises.  ...  The article highlights the importance of information and the need to manage its security.  ...  Only 16% of employees of the surveyed enterprises do not see the importance of information security for enterprises.  ... 
doi:10.2478/mape-2019-0052 fatcat:po6w3ltwdzeqrfiu5exiojg6hy

Application of Computer Technology in Human Resource Management and Social Security

Tianji Li, Lequn Li
2015 Open Cybernetics and Systemics Journal  
This paper mainly talks about the application of computer in human resources and social security, and studies the effective way to improve the work efficiency of human resource and social security department  ...  The wide application of computer in human resource management has greatly promoted the development of social security Since the reform and opening up, China has introduced the market competition system  ...  According to the enterprise human resources and unreasonable values, find the database and match the final output solution.  ... 
doi:10.2174/1874110x01509011892 fatcat:3yiejuon35fnlcv4wh63nsxiwa

Providing Database Encryption as a Scalable Enterprise Infrastructure Service

Ulf T. Mattsson
2005 Social Science Research Network  
Although access control has been deployed as a security mechanism almost since the birth of large database systems, many still look at database security as a problem to be addressed as the need arises  ...  to create, store, and securely access databases.  ...  Data privacy Database-level encryption allows enterprises to secure data as it is written to and read from a database.  ... 
doi:10.2139/ssrn.664201 fatcat:4lbiepn54zaqndcdwol2cy3qqm

Reform of Database Course in Police Colleges Based on "Working Process"

Gao Jian
2017 International Journal of Modern Education and Computer Science  
are required in the network security supervision work in the operation skill and ability.  ...  According to the actual research results, combined with the teaching experience, this paper puts forward the reform method of the database course in police colleges.  ...  Third, select a common public security information system as the object of operation, and select the commonly used enterprise class database MSSQL as an experimental tool.  ... 
doi:10.5815/ijmecs.2017.02.05 fatcat:pliedtm7mnaljjmf7wxc7r2krq

The Research of Enterprise Security Search Engine

Xiaopu Ma, Xing Chen, Ning Cheng, Ruixuan Li
2016 International Journal of Control and Automation  
In this paper, an architecture for enterprise security search engine based on role-based access control is presented, and based on this architecture the search engine system can not only crawl the documents  ...  from the controlled resource sites but also can return different searching results from the index database according to the user's different identities and permissions for the same keywords.  ...  We thank the anonymous reviewers for their helpful comments.  ... 
doi:10.14257/ijca.2016.9.1.17 fatcat:t33tguc5uzgmvkjm6aaghtryau

Securing Sensitive Data with the Ingrian DataSecure Platform [chapter]

Andrew Koyfman
2005 Lecture Notes in Computer Science  
Adding security at the database layer allows an enterprise to protect sensitive data without rewriting associated applications.  ...  The damage caused by these thefts can be disastrous, and today an enterprise with poor data security may also find itself violating privacy legislation and be liable to civil lawsuits.  ...  This problem is particularly challenging in the case of database security, especially when the database runs on a cluster of machines.  ... 
doi:10.1007/11507840_19 fatcat:njuzksakevg4bouvjcgs5bppra

Safety Mechanisms in Relational Database as Part of the IT System of the Enterprise

Szymon Berski, Martyna Bilau
2019 New Trends in Production Engineering  
MySQL DBMS offers many security mechanisms, and to secure the database, system of users permissions to objects have been selected and also an encryption of access passwords for users and connections to  ...  In order to extend the functionality of the computer database of the enterprise, a model of its resource flow was created and an intensional and extensional part was created for a test database based on  ...  ACKNOWLEDGEMENTS The research was carried out as part of statutory research No. BS/PB-201-302/2018 financed by: Ministry of Science and Higher Education.  ... 
doi:10.2478/ntpe-2019-0068 fatcat:u7mpa2d4rvhajnetgva6z2m7am

Security of shared data in large systems

Arnon Rosenthal, Marianne Winslett
2004 Proceedings of the 2004 ACM SIGMOD international conference on Management of data - SIGMOD '04  
The goals of this tutorial are to enlighten the VLDB research community about the state of the art in data security, especially for enterprise or larger systems, and to engage the community's interest  ...  The tutorial includes numerous suggested topics for research and development projects in data security.  ...  Introduction Security is increasingly recognized as a key impediment to sharing data in enterprise systems, virtual enterprises, and the semantic web.  ... 
doi:10.1145/1007568.1007724 dblp:conf/sigmod/RosenthalW04 fatcat:dahe7apisbb5xkyhwkipxjvqga

The Analysis of Firewall and VPN in Enterprise Network Performances

2015 International Journal of Information Systems and Engineering  
The results show that enterprises network vulnerabilities could be fixed.  ...  The rapid increase in communication technology has influenced global changes in the network security characteristics.  ...  Presently none of the users in the network can access Database and HTTP services after the implementation of this security policy in the Enterprises network.  ... 
doi:10.24924/ijise/2015.11/v3.iss1/129.150 fatcat:7bfzpyytrfhsnbf6syon26vmhm
« Previous Showing results 1 — 15 out of 134,249 results