Strategy And Guidelines For Sheltering Database To Database Communication Through Database Links
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
The majority of organizations today prefer Oracle database systems to maintain their operational and transactional data. Multiple databases will be used for different fields of operation in an organization. There arise many scenarios where one database will need to access the data stored in another database. Database to database communication is enabled in Oracle database with the help of database links. Among the numerous database products, Oracle database is regarded as a highly secure database. But still it has a few security issues in certain areas, including database links. This presented paper makes an attempt to highlight these security weaknesses and compose plans and guidelines to handle the database link in various situations.
Authors and Affiliations
Rajesh M, Sumit Saseendran
Performance Analysis of Two Methods for Dimension Reduction in Face Recognition
Face recognition has been a fast growing, challenging and interesting area in real time applications. This work aims to compare the two renowned techniques of feature dimension reduction on the basis of the classific...
Extensions of The Crypto Graphic Methods To Provide Efficient Routing Of Encrypted Events
Content-based pub/sub is the alternative that gives the most communicative subscription model, where subscriptions describe restrictions on the message content. Its persuasiveness and asynchronous nature is above all...
A Study of Efforts Done by Computing Industries for Green Computing
Green computing is one of the biggest concepts these days. The first thing that may come to mind when we think of “Green Computing” is simply using less electricity, but there’s a lot more to that. The challenge of g...
A level set Image Articulations in presence of disagreement with MRI Scanning
In previous techinices the flow of the level set method for image segmentation can be depicte. A level set methods have been widely use in image processing and computer vision. Intensity in homogeneity often occurs i...
An Efficient Searching and File Replication Consistency in Peer-to-Peer Networks
Unstructured Network with file sharing properties with peer-to-peer (P2P) is very popular in the market. Though it is so popular it produce flooding query messages and result a heavy network traffic and which may not...