database relation
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 2)

H-INDEX

6
(FIVE YEARS 0)

2021 ◽  
Vol 1 (2) ◽  
pp. 83-89
Author(s):  
Muhammad Iqbal Panjaitan ◽  
Zekson Arizona Matondang

Abstract-Website can be interpreted as a collection of pages that are used to publish information in the form of text, images and other multimedia programs in the form of animation (motion pictures, motion writings), sound, and or a combination of all of them both static and dynamic that form one a series of interrelated buildings between one page and another page. In this paper the design of applications that can be used as part of the dissemination of information to course institutions to increase the introduction of these agencies, to the design through the DFD design, database relation design and form design will be used as a reference in making websites.


2021 ◽  
Vol 1783 (1) ◽  
pp. 012050
Author(s):  
Nunu Kustian ◽  
Siti Julaeha ◽  
Dudi Parulian ◽  
Noni Selvia ◽  
Erlin Windia Ambarsari

2015 ◽  
Vol 53 ◽  
pp. 124-144 ◽  
Author(s):  
Torsten Kilias ◽  
Alexander Löser ◽  
Periklis Andritsos

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Lancine Camara ◽  
Junyi Li ◽  
Renfa Li ◽  
Wenyong Xie

Nowadays, internet is becoming a suitable way of accessing the databases. Such data are exposed to various types of attack with the aim to confuse the ownership proofing or the content protection. In this paper, we propose a new approach based on fragile zero watermarking for the authentication of numeric relational data. Contrary to some previous databases watermarking techniques which cause some distortions in the original database and may not preserve the data usability constraints, our approach simply seeks to generate the watermark from the original database. First, the adopted method partitions the database relation into independent square matrix groups. Then, group-based watermarks are securely generated and registered in a trusted third party. The integrity verification is performed by computing the determinant and the diagonal’s minor for each group. As a result, tampering can be localized up to attribute group level. Theoretical and experimental results demonstrate that the proposed technique is resilient against tuples insertion, tuples deletion, and attributes values modification attacks. Furthermore, comparison with recent related effort shows that our scheme performs better in detecting multifaceted attacks.


2013 ◽  
Vol 2013 ◽  
pp. 1-16 ◽  
Author(s):  
Aihab Khan ◽  
Syed Afaq Husain

We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully.


1991 ◽  
Vol 16 (3) ◽  
pp. 564-566 ◽  
Author(s):  
Ravi Mukkamala ◽  
Sushil Jajodia
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document