[PDF][PDF] An Efficient Approach to Resolve Covert Channels.

MA Elsadig, YA Fadlalla - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
The competitive edge of many companies and public trust in government institutions can
often depend on the security of the information held in their systems. Breaches of that …

Correct Web Service Transactions in the Presence of Malicious and Misbehaving Transactions

JT Ravan III - 2021 - search.proquest.com
Concurrent database transactions within a web service environment can cause a variety of
problems without the proper concurrency control mechanisms in place. A few of these …

[PDF][PDF] Query acceleration in multimedia database systems

RA Haraty, R Karaki - Proc of the Int'l Conf on Advances in …, 2015 - personales.upv.es
Web comes the enormous increase in stored digital contents, which could challenge users
to search and use the multimedia data efficiently. This work focuses on hastening …

[PDF][PDF] Analysis of Challenges in the Design and Development of Multi-Level Secure Databases

P Sapra, S Kumar - academia.edu
Database security mainly deal with the secrecy, integrity and availability of data stored in a
database. The common threats to the databases involve Privilege Abuse, Weak …