CRYPTOGRAPHY

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1

Abstract

To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. Database security policies are guidelines for present and future decisions regarding the maintenance of the database security. Database security mechanisms are the functions used to enforce the database security policies.  There are number of security policies that can be applied on data in order to protect the data against unauthorized access. Protecting the data is the prime need of an organization.

Authors and Affiliations

Dr. Vinod Kumar, Er. Gagandeep Raheja, Ms Subeena Sareen

Keywords

Related Articles

Direct Machine Translation System from Punjabi to Hindi for Newspapers headlines Domain

Machine Translation System is an important area in Natural Language Processing. The Direct MT system is based upon the utilization of syntactic and vocabulary similarities between more or few related natural languages. T...

THE IMPROVEMENT OF THE STABILITY PROBLEM OF RESHA GENERATION PLANT IN JORDAN

This study, discuss the stability problem of Resha generation plant. The length of the transmission line which connect Resha with Haranah station, decrease the power transferred capacity that increase the risk of transie...

ENHANCED CBIR MECHANISM USING STEERABLE PYRAMID AND MEDIAN VECTOR ALGORITHM

Recently, digital content has become a significant and inevitable asset of or any enterprise and the need for visual content management is on the rise as well. Content-based image retrieval has attracted voluminous resea...

Wavelets assisted fuzzy edge refinement

Image enhancement is a crucial pre-processing step to be performed for various applications where object recognition, identification, verification is required. Among various image enhancement methods, edge enhancement ha...

Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems

In the medical industry, it is critical to ensure the confidentiality of patients’ personal health records when storing and managing them. Before cloud computing surfaced, heath providers used local servers and hard dr...

Download PDF file
  • EP ID EP649849
  • DOI 10.24297/ijct.v4i1a.3030
  • Views 124
  • Downloads 0

How To Cite

Dr. Vinod Kumar, Er. Gagandeep Raheja, Ms Subeena Sareen (2013). CRYPTOGRAPHY. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 4(1), 29-32. https://europub.co.uk/articles/-A-649849