CRYPTOGRAPHY
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies. There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.
Authors and Affiliations
Dr. Vinod Kumar, Er. Gagandeep Raheja, Ms Subeena Sareen
Secure Distributed Accountability Framework for Data Sharing in Cloud Environment
Cloud computing is used to provide scalable services which are easily used over the internet as per the requirement. A major feature of the cloud services is that users data are remotely processed in unknown machines tha...
Occlusion Detection in M-FISH Human Chromosome Images
Automation of Chromosome Analysis has long been considered a tedious task due to the partial occlusion of chromosomes. This calls for a non-trivial, dedicated procedure to segment chromosomes. In this paper, a new method...
Prognostic Load Balancing Strategy for Latency reduction in Mobile Cloud Computing
In Mobile Cloud Computing (MCC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio...
AN EFFECTIVE USAGE PARAMETER CONTROL MODEL FOR CELL POLICING IN ATM NETWORKS
The primary role of traffic control procedures is to protect the network so that it can achieve the required network performance objectives and yield a high quality of service (QoS). To guarantee the QoS, the network imp...
A Review of Security Threats by The Unauthorized in The E-Learning
Computers have become an integral part of our everyday existence. They are used to store and to send among students’ letters and sensitive documents, materials. In today's focused world, each Organization is endeavorin...