Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Database Security
biblio
In-database Auditing Subsystem for Security Enhancement
Submitted by grigby1 on Fri, 07/15/2022 - 12:44pm
Databases
SQL trigger
in-database auditing
Database Security
database forensics
audit trail analysis
codes
relational database security
Metrics
composability
tools
Access Control
Generators
Resiliency
resilience
Human behavior
pubcrawl
Intrusion Detection
relational databases
biblio
Securing Distributed Database Using Elongated RSA Algorithm
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
Fish
Throughput
RSA algorithm
Resiliency
query processing
pubcrawl
Metrics
Measurement
Human behavior
Asymmetric Encryption
encryption
encoding
Elongated RSA
Distributed databases
decryption
Database Security
Compositionality
Classification algorithms
biblio
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
Submitted by grigby1 on Fri, 11/20/2020 - 2:27pm
Information systems
Servers
security risks
Security Policies Analysis
risk management
risk assessment model
risk assessment approach
risk assessment
RBAC
pubcrawl
policy-based governance
model enhancement
Access Control
information system security
Databases
Database Security
correlation links
Correlation
authorisation
Anomalies Correlation
access control service
access control policy
access control policies management
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
Database Security
causality
centralised vector-clock architecture
chain of custody
chain of custody properties
CoC properties
commercial database systems
database audit
database audit records
auditing capabilities
digital evidence
forensically-aware distributed database architecture
hybrid logical clocks
role segregation
third-party verification
transactional databases
user transactions
Security Audits
Provenance
computer architecture
Resiliency
Human behavior
pubcrawl
Distributed databases
Forensics
Digital Forensics
Data mining
security
Proposals
database forensics
database management systems
Scalability
Clocks
auditing
action accountability
admissible audit records
biblio
Automatic Whitelist Generation for SQL Queries Using Web Application Tests
Submitted by grigby1 on Mon, 02/10/2020 - 11:26am
severe vulnerability issue
query patterns
query processing
Registers
relational databases
relational database security
research and development
resilience
Resiliency
security of data
query detection
SQL
SQL detection
SQL injection
SQL queries
Web application test
Web application tests
Whitelist
Whitelists
development process
automated generation
Automatic testing
automatic whitelist generation
blacklisting
collaboration
composability
confidential information
Database Security
Databases
application-specific implementations
Human behavior
internet
large-scale Web applications
legitimate queries
Metrics
policy-based governance
privacy
pubcrawl
biblio
Detection of SQL Injection Attacks: A Machine Learning Approach
Submitted by grigby1 on Mon, 02/10/2020 - 11:25am
classifiers
collaboration
Database application
Database Security
Human behavior
machine learning
Metrics
policy-based governance
privacy
pubcrawl
resilience
Resiliency
SQL detection
SQL injection
biblio
Examining Leakage of Access Counts in ORAM Constructions
Submitted by grigby1 on Mon, 12/16/2019 - 3:54pm
Control Theory
Cyber Physical System
cyber physical systems
Database Security
Human behavior
Information Leakage
number of accesses
Oblivious RAM
privacy
pubcrawl
resilience
Resiliency
Scalability
biblio
A New Scheme for Protecting the Privacy and Integrity of Spatial Data on the Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
indexing
Z-curve
Spatial databases
spatial data
Resiliency
Redundancy
query processing
pubcrawl
privacy protection
Outsourced Database Integrity
Outsourced Database
Metrics
IT costs
indexing scheme
cloud
Indexes
encryption
Database Security
database querying
data redundancy
data privacy
data integrity
data centers
Cryptography
computer centres
composability
Cloud Security
Cloud Computing
1
2
next ›
last »