Trigger and Database Security
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 4, Issue 1
Abstract
Database Security is a growing concern evidenced by an increase in the number of reported incidencesof loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. Security models, developed for databases differ in many aspects because they focus on different features of the database security problem or because they make different assumptions about what constitutes a secure database. This paper explains the need for a database trigger and it role in enforcing the various database security challenges.
Authors and Affiliations
YAYA ITAI, AWODELE OLUDELE PhD, NICOLAE GOGA PhD
Coloured Image Segmentation Using K-Means Algorithm
Very large collections of images are growing ever more common. From stock photo collections to proprietary databases to the Web, these collections are diverse and often poorly indexed; unfortunately, image retrieval syst...
Hand gesture recognition using average background and logical heuristic equations
This paper introduces a hand gesture recognition algorithm for Human Computer Interaction using real-time video streaming .The background subtraction technique is used to extract the ROI (Region Of Interest) of the hand....
SIAVA: Secret Information Aggregation Design for Various Applications in Wireless Sensor Networks
In general information aggregation design that reduces a large amount of transmission is the most practical technique. In previous studies, homomorphic encryptions have been applied to conceal communication during aggreg...
DSS FOR IMPLEMENTING SYSTEMIC APPROACH TO FORECASTING
A computer based decision support system is proposed the basic tasks of which are modeling and forecasting of financial processes and credit risk estimation. The system is developed on the basis of system analysis princi...
Odd Graceful Labeling Of Tensor Product of Some Graphs
(G);E(G)) with p vertices and q edges, if there exists an injectionfunction : V (G) ! f0; 1; 2; ; 2q ô€€€ 1g with each edge uv assignedthe label jf(u)ô€€€f(v)j, the resulting edge labels are f1; 3; 5; ; 2qô€€€1g.The tens...