Design and Realization of Security Network Database

2014 ◽  
Vol 539 ◽  
pp. 313-316
Author(s):  
Wei Jiang Geng

This paper analyzes the functional design and structure design of the database security model networks, research and further realizes the key features of the model. The system is suitable for network security database management system, which has a certain universality and portability.

2014 ◽  
Vol 608-609 ◽  
pp. 331-335
Author(s):  
Fu Mei Liu ◽  
Wen Liang Qu

Database is the core part of university digital campus platform. Database encryption is an effective method to guarantee the security of data. The paper analyze the structure design of database security model, and study the design of mode function, key features and further implementation model. The system is suitable for security protection for network database management, and has a certain degree of universality, portability and security.


Author(s):  
Chanintorn Jittawiriyanukoon

<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.</span>


1993 ◽  
Vol 12 (2) ◽  
pp. 169-189 ◽  
Author(s):  
John A. Fitch ◽  
Lance J. Hoffman

Author(s):  
Rajesh Kumar Meena ◽  
Harnidh Kaur ◽  
Kirti Sharma ◽  
Simran Kaur ◽  
Smriti Sharma

Author(s):  
C. V. Anchugam ◽  
K. Thangadurai

Writing a chapter on network security is something like writing a brief introduction to flying a commercial airliner. Dissimilar, data communications of the past, today's networks incorporate varied devices that handle the data because it passes from the sender to the receiver. The first question to address is what we mean “network security”. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. A generic definition of security is “freedom from risk or danger and safety”. However it is not only human errors that can cause problem to network security, problems can also be caused by natural forces like fire breakouts, earthquakes, floods lightning etc. The ways network administrators think about securing networks has been changed by an increasingly dynamic and technically challenging risk environment. Security is an assessment of risk. Secure environments are designed and developed through an intentional effort.


Sign in / Sign up

Export Citation Format

Share Document