TechnoNews

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, February 14, 2013

Thesis: Database Issues Policy

Posted on 4:32 AM by Unknown
Project Background
Introduction The rapid development in the use of information technology has led to an increased use of databases for information storage. Newer technologies, such as data mining. Stored data in a way that not only allow allow quick access to information buried deep but also for evaluating information from a variety of insight and analysis information is used by companies not only improve the performance , but also enable them to make critical business decisions. On the other hand, the proliferation of the Internet has prompted various companies, the database of their website, which is used not only to better integrate information of the transaction, but the client, store personal information as well as well. This raised the question of privacy of information stored in the database. Any unauthorized access to the database not only jeopardizes the privacy of user data, but can also lead to loss of confidential information about the organization, their use concerns in the business environment (Thuraisingham). investigate
target
The purpose of this research is the question that could lead to a relationship management database to include data protection. It will also evaluate the proposed solutions presented in previous literature.
Database privacy concerns have always been a point of discussion in most of the literature available on the Internet in connection with the database. One of the main issues in the privacy of the database in enterprise, access to non-availability of information through knowledge of available data (Thuraisingham).
different solutions have been proposed in the literature, so the Goal-Based Access Control system for relational databases (Byun and Li) andImplementation the database inference controller (Thuraisingham, Ford and Collins). Privacy is an issue when information must be shared between the two databases. One of the solutions available literature to solve this problem, the method of minimal information sharing across multiple databases by developing a new protocol (Agrawal and Srikant Evfimievski). The exchange of data anonymity is also discussed in the literature. Latanya Sweeney, in his paper a solution to the problem of customer data k known before he set off in a public place (Sweeney), proposed. In addition, recently, the development of technologies related to mobile devices, also raised concerns on privacy in a location-independent environment (Mokbel) light. The focus of this research include the recent problems in database privacy, the design of an architecture that can face the issue of privacy in location-based applications with the introduction of minimal complexity and overhead (Mokbel) , and New Deal Design general data folding techniques to enhance the privacy of data stored in data warehouses (Kozielski and Wrembel).
Email ThisBlogThis!Share to XShare to Facebook
Posted in Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Space with windows
    Whatever may retail space, one of the most important parts of your design, window space. The right place dressed from the very beginning, an...
  • Germany tops the European list of Cybercrime for maximum active bot
    Germany all the other European countries in cybercrime. In 2010 alone, Symantec discovered 286 million new global threats for businesses and...
  • Wireless Networking Equipment, A useful Guide
    Do you want to set up a wireless network? Imagine what kind of equipment is required for your wireless network? It is a very useful guide fo...
  • IT Disaster Recovery Quick Start Guide
    If you've ever spent a few days in the hope of recovering nerves vital data, you know that if your technology is not available, your bus...
  • Development delayed
    Every child follows a particular path of growth and development called milestone in the development. Developmental delay occurs when childre...
  • Remove PrivacyRight - Easy PrivacyRight from your computer
    What PrivacyRight? /> PrivacyRight rogue anti-spyware program. This means PrivacyRight a false application that pretends itself as a anti...
  • Science and Technology Interface
    The most important consideration should be the integration of science and technology. We have established the boundaries between science an...
  • Voltage controlled oscillator Fine-tuning of the Communication Systems division
    The technological world, communication Contact the geographical boundaries easier and faster help is not as easy as it sounds. Understand...
  • Nintendo developing
    If you look at the whole picture, you notice the gaming industry is a factor only for a short time, since the '70s. It took about a deca...
  • Features of E-Mail Encryption: Why do you use email encryption software
    In case depends on email for business, make sure that e-mail archiving software installed in your community. This plan can shield all the in...

Categories

  • Computing
  • Hardware
  • Internet
  • IT Management
  • Mobile Tech
  • Security
  • Servers
  • Software
  • Technology

Blog Archive

  • ▼  2013 (181)
    • ►  June (15)
    • ►  May (31)
    • ►  April (33)
    • ►  March (32)
    • ▼  February (29)
      • Aarkstore Enterprise Convergence Technology in Ind...
      • Shared Universe
      • VOIP phone system for effective communication
      • Kongregate Games
      • Why is encryption when it May data transmission
      • Canadian laws for spy video surveillance
      • Administers Enterprise Data Sources ODBC Driver Da...
      • Polycom video conferencing system for Best Communi...
      • Volkswagen Performance Chip Shop Online
      • DRAM manufacturers
      • PSRAM, Cellular RAM: Enhanced pioneering computer ...
      • Buzz Lightyear Costume
      • Features of E-Mail Encryption: Why do you use emai...
      • Effective Communication: The Basics of Paging Systems
      • Thesis: Database Issues Policy
      • California Labor Law - Prohibition of Race Discrim...
      • The best e-readers for students
      • Desktop RAM manufacturer? An Overview
      • Developer Newsletter
      • Data Center Solutions for Data Storage remedy conc...
      • HUAWEI E5836 HUAWEI E586 MiFi Hotspot vs
      • Data Center for dealing with increasing Data Stora...
      • Fan of hardware
      • Space Saving Hangers
      • Clean Tech PR initiatives are needed to motivate c...
      • Internet Income
      • The future of the Android operating system
      • Try Wifi WiMAX
      • Core Competencies for Volunteer Programs?
    • ►  January (41)
  • ►  2012 (45)
    • ►  December (45)
Powered by Blogger.

About Me

Unknown
View my complete profile