87-01-90 Establishing Security Controls in a Distributed Data Base

نویسندگان

  • Sooun Lee
  • Mohamed Nour
  • Soong H. Chung
چکیده

Distributed computing systems can provide benefits not available with centralized computing systems. However, it can be difficult to maintain the security and integrity of data on distributed systems. In fact, some characteristics of distributed data bases give rise to additional security concerns. This article provides a detailed analysis of information security issues in the distributed data base environment and suggests a model for establishing and implementing effective security controls.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Distributed Contingency Logic and Security

In information security, ignorance is not bliss. It is always stated that hiding the protocols (let the other be ignorant about it) does not increase the security of organizations. However, there are cases that ignorance creates protocols. In this paper, we propose distributed contingency logic, a proper extension of contingency (ignorance) logic. Intuitively, a formula is distributed contingen...

متن کامل

Trade and National Security: A Test for Best-Known Hypothesis

National security depends on soft power, the ability of a country to generate and use its economic power and to project its national values. It also depends on long-term factors that contribute to economic growth and increase the total resources base available not only for defense but to provide economic security in the form of income and business opportunities for individuals. The economic iss...

متن کامل

87-01-95 Security in Value-Added Networks

Businesses that rely on a value-added network to provide information processing and communications services are only as secure as the network itself. The customer should understand the types of processing and control services provided by such vendors, and the potential exposures that use of these networks can entail. This article describes the control issues that must be addressed, the controls...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998