scholarly journals Understanding of the common methods in e-HRM data security

2019 ◽  
Vol 1237 ◽  
pp. 022010
Author(s):  
Yonggui Guo ◽  
Lina Cao ◽  
Xiao Gao ◽  
Xuming Lv
Keyword(s):  
2013 ◽  
Vol 756-759 ◽  
pp. 2428-2432
Author(s):  
Xiao Jing Zhu ◽  
Yuan Guai Lin

With the growing popularity of Web applications and Web attacks increasing; Web applications protection and data security have become the core focus of the information security system of enterprises and institutions. The paper briefly presents the harm of the common several kinds of Web attacks, and analyzes their principle, gives their defense measures. On this basis, the defense system of both software and hardware design is proposed. It achieves software defense design based on Web software development and Web application management, and hardware defense design based on H3C SecBlade IPS, to effectively guarantee the security of Web applications.


Author(s):  
Niko Surya Atmaja ◽  
S Sumijan ◽  
Y Yuhandri

The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security


Author(s):  
Zana Thalage Omar ◽  
Fadhil Salman Abed ◽  
Shaimaa Khamees Ahmed

Most banks in our time still use the common traditional systems of high cost and relatively slow, we are now in the era of speed and technology, and these systems do not keep pace with our current age, so saving cost and time will be considered a fantastic thing for banks. The way to that is to implement cloud computing strategies with Considering data security and protection when it comes to using the cloud. The best solution to protect data security on the cloud is fully homomorphic encryption systems. The time it takes to encrypt and decrypt data is one of the main barriers it faces. Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. The security of the new system depends on the issue of analyzing huge integers, which reach 2048 bits, to their prime factors, which are considered almost impossible or unsolvable. A banking application has also been created that encrypts the data and then stores it on the cloud. The application allows the user to create accounts and deposits, transfer and withdraw funds, and everything related to banking matters.


Author(s):  
Abdul Wahid ◽  
Retantyo Wardoyo

AbstractData security is an important problem in computer technology. This paper discusses security system for audio data. This technology is crucial because the multimedia technology has been improved very fast. One of the common audio format forms is wave audio format. The wave format is an uncompressed file format which is for RIFF specification owned by Microsoft. It is used for saving multimedia file. By using DES algorithm, the wave data could be encrypted for hiding information contained in the data. DES algorithm is chosen in this research because DES algorithm is one of the best symmetrical cryptography algorithms and it has been used world wide. This research is expected to give contribution to the audio security concept, especially for audio data security using wave file format.Keywords : audio security, DES algorithm, wave Omar


2019 ◽  
Vol 1 (4) ◽  
pp. 65-71
Author(s):  
Niko Surya Atmaja

The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security


2013 ◽  
Vol 756-759 ◽  
pp. 1185-1189
Author(s):  
Duan Yang Zhao ◽  
Qing Xiang Xu ◽  
Xia Xia Hu

More and more organizations and individuals outsource their storage and computing business into cloud computing, which is a representation of a movement towards the intensive, large scale specialization and economy. Cloud computing brings about convenience and efficiency, but challenges in the areas of data security and privacy protection. This paper identifies the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing, and to know about critical analysis about the different security models and tools proposed. Key security strategies from the infrastructure, operation and security incident response relieve the common security issues of cloud computing.


2013 ◽  
Vol 846-847 ◽  
pp. 1590-1594
Author(s):  
Liu Qing Yang ◽  
Xiang Chen ◽  
Wei Min Huang

With the rapid growth of colleges and universities teaching affairs and resources, the amounts of data also grow rapidly. The data also requires stricter than ever on the data security and efficiency. So it has become the top priority of the School information-building department to keep the valuable data safe, reliable and integrity. This article describes the design of the campus storage and backup solutions based on the SAN, to meet the common needs of multiple applications in the files, databases, office business, to achieve the unified allocation and management of the resource sharing.


1978 ◽  
Vol 48 ◽  
pp. 389-390 ◽  
Author(s):  
Chr. de Vegt

AbstractReduction techniques as applied to astrometric data material tend to split up traditionally into at least two different classes according to the observational technique used, namely transit circle observations and photographic observations. Although it is not realized fully in practice at present, the application of a blockadjustment technique for all kind of catalogue reductions is suggested. The term blockadjustment shall denote in this context the common adjustment of the principal unknowns which are the positions, proper motions and certain reduction parameters modelling the systematic properties of the observational process. Especially for old epoch catalogue data we frequently meet the situation that no independent detailed information on the telescope properties and other instrumental parameters, describing for example the measuring process, is available from special calibration observations or measurements; therefore the adjustment process should be highly self-calibrating, that means: all necessary information has to be extracted from the catalogue data themselves. Successful applications of this concept have been made already in the field of aerial photogrammetry.


Sign in / Sign up

Export Citation Format

Share Document