Security methods
-
Securing digital data in the process of retrieving financial information can be seen as important requirement today. This paper focuses on developing a secure encryption (SE) scheme that supports efficient querying on encrypted data in financial databases.
8p tuetuebinhan000 23-01-2025 1 1 Download
-
Bài giảng "Bảo mật cơ sở dữ liệu: Security models" trình bày các nội dung: Access control, types of Access control, mandatory access control, rules based access control, authentication methods, operating system authentication,... Mời các bạn cùng tham khảo.
141p thangnamvoiva20 20-09-2016 81 6 Download
-
Bài giảng "Bảo mật cơ sở dữ liệu: Security methods for statistical databases" trình bày các nội dung: Laws, HIPAA compliance, types of statistical databases, security methods, query set restriction, microaggregation, output perturbation,... Mời các bạn cùng tham khảo.
24p thangnamvoiva20 20-09-2016 82 6 Download
-
Models representing uncertainty factors; data mining techniques; calculation methods of power systems taking into account uncertainty factors.
31p gaocaolon6 30-07-2020 23 2 Download
-
The thesis focuses on the principles of recording items in financial statements, methods of preparing and presenting financial statements on the basis of applying the fair value in accounting.
27p cothumenhmong6 17-07-2020 34 4 Download
-
In this article the work of the components of information of protection tools on the occurring violations, their types and the elimination of these violations and the possible trajectory of a change over time of the functioning states of information of protection tools with a discrete time are researched.
10p lucastanguyen 01-06-2020 22 3 Download
-
Pest control practices in the vegetable crops have been heavily dominated by the routine use of broad-spectrum insecticides to control pests. Concerns have emerged about the adverse consequences of over use of pesticide. These consequences include short and longterm health hazards, contamination and environmental degradation. To minimize the pest losses farmers heavily depend on the chemical pesticides and accessing pest management information from the pesticide dealers due to weak state extension support system.
9p nguaconbaynhay5 16-05-2020 20 3 Download
-
Like paper-based signatures, digital signatures intend to respect a number of security assumptions. Methods of digital signature apposed by a single user have been defined and are widely used. But is it sufficient? What if a legal document requires witnesses and notarization, or a contract needs the signatures of several officers?This paper will first show the basics to understand digital signatures and how the a security properties of integrity, authentication, and non-repudiation are respected.
11p dunglh2013 02-04-2014 59 2 Download
-
Sample Configuration for Authentication in OSPF Document ID: 13697 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram Configurations for Plain Text Authentication Configurations for MD5 Authentication Verify Verify Plain Text Authentication Verify MD5 Authentication Troubleshoot Troubleshoot Plain Text Authentication Troubleshoot MD5 Authentication Related Information Introduction This document shows sample configurations for Open Shortest Path First (OSPF) authentication which allows the flexibility to authenticate OSPF nei...
9p vanmanh1008 21-05-2013 36 2 Download
-
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2008, Article ID 529879, 16 pages doi:10.1155/2008/529879 Research Article Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling Francis Minhthang Bui and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, 10 King’s College Road, Toronto, Ontario, Canada M5S 3G4 Correspondence should be addressed to Dimitrios Hatzinakos, dimitris@comm.utoronto.
16p dauphong18 24-02-2012 57 4 Download
-
/log log_filename-specifies a file in which to log the status of the import process. If not specified, the import-processing information is logged in the scesrv.log file which is located in the %windir%\security\logs directory
6p kisiheo 26-07-2010 79 6 Download
-
Windows Server 2003 built-in local security groups (the screenshot is taken on the domain controller) Standard security settings are applied by Security Configuration Manager during the operating system installation,
7p kisiheo 26-07-2010 77 4 Download
-
[ Team LiB ] Understanding Information Rights Management New to Outlook 2003, Information Rights Management (IRM) enables you to secure a message, including any attachments, to prevent the recipient from printing, forwarding, or copying the message or attachment. The recipient can open the message only after she confirms her identity by logging on to her Passport account. Although there are similarities between digital signatures and IRM, they're two distinct methods you can use to secure your messages. You can digitally sign and encrypt IRM-protected messages.
2p chutieuchuathieulam 23-07-2010 83 7 Download