منابع مشابه
Multilevel security for information retrieval systems
Bhavani Thuraisingham is a lead engineer with the MITRE Corporation where she has initiated R & D activities in secure distributed database systems, secure object-oriented database systems, and secure intelligent database systems. She is currently working on multilevel object-oriented data models, approaches to handle the inference problem, theory of concurrency control for multilevel databases...
متن کاملMultilevel security for information retrieval systems - II
In this paper we describe multilevel security issues for hypermedia-based information retrieval database management systems. We first summarize the discussion in our earlier paper on the use of object-oriented approach for developing secure information retrieval systems and then discuss in detail how such a system can be augmented by a Linker to provide hypermedia database management system cap...
متن کاملSTEGCRYP: A Multilevel Information Security Shceme
In this paper, Cryptography and Steganography techniques are combined to enhance the security level of data communication over an unsafe distributed network. The standard LSB(Least Significant Bit) steganography method is also modified by digitally signing a information of starting position of hided message in image, so that any other third person can’t determine the position of beginning of hi...
متن کاملMultilevel Security and Information Flow in Petri Net Workflows
In information systems — especially with the growing importance of electronic commerce — the modeling and analysis of business processes has raised interest over the last years. If combined with security issues, a formal model of a process can be used to analyze the system according to specific policies. This paper presents a Petri net model for business processes that combines information and ...
متن کاملMultilevel Adaptive Security System
MULTILEVEL ADAPTIVE SECURITY SYSTEM by Hongwei Li Recent trends show increased demand for content-rich media such as images, videos and text in ad-hoc communication. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such information over resource constrained ad hoc networks. In this work, traditional data security mechanisms, existing ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Ukrainian Information Security Research Journal
سال: 2012
ISSN: 2410-7840,2221-5212
DOI: 10.18372/2410-7840.14.3366