Trigger and Database Security
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.
Authors and Affiliations
YAYA ITAI, AWODELE OLUDELE PhD, NICOLAE GOGA PhD
Implementing Clustering Based Approach for Evaluation of Success of Software Reuse using K-means algorithm
A great deal of research over the past several years has been devoted to the development of methodologies to create reusable software components and component libraries. But the issue of how to find the contribution of t...
REVISED LOAD BALANCING ALGORITHM IN CLOUD COMPUTING
Cloud computing is one of the latest and upcoming paradigm that offers huge benefits such as reduced time to market, unlimited computing power and flexible computing capabilities. It is a model that provides an on-demand...
AUTOMATIC INITIAL SEGMENTATION OF SPEECH SIGNAL BASED ON SYMMETRIC MATRIX OF DISTANCES
The most common issue of a speech signals analisys and artificial intelligence systems development is determining of temporal and frequency charactristics. That’s because any undetermined signal is defined as a nonline...
Elasto-Plastic Analysis of 3D Frames with Generalized Yield Function
Three dimensional three node elasto-plastic finite element has been presented. Hinges have been assumed to form at the points of integration (Gauss points) which are distributed over the length of the element. One integr...
A Novel VLSI Architecture for SPHIT Encoder
In this Paper we propose a highly scalable image compression scheme based on the set partitioning in hierarchical trees (SPIHT) algorithm. Our algorithm called highly scalable SPIHT (HS-SPIHT), supports spatial and SNR s...