数据库、云和基站访问控制机制的比较

Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada
{"title":"数据库、云和基站访问控制机制的比较","authors":"Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada","doi":"10.1109/ICECA.2018.8474933","DOIUrl":null,"url":null,"abstract":"Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.","PeriodicalId":272623,"journal":{"name":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparing the Access Control Mechanism in Database, Cloud and Femtocells\",\"authors\":\"Harshita R. Jhurani, P. Chandana, Yarram Vijay Kumar Reddy, M. Sharada\",\"doi\":\"10.1109/ICECA.2018.8474933\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.\",\"PeriodicalId\":272623,\"journal\":{\"name\":\"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA.2018.8474933\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA.2018.8474933","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

自人类进化以来,安全一直是一个重大问题。访问控制是指只向指定用户提供对数据的访问权限。目前,使用了各种机制并实现了许多策略来保护机密数据。这些机制并不总是容易实现的。在执行过程中遇到了许多挑战,并且以特别的方式设计了各种设备以满足当前的需求。这些器件和方法在各个领域的应用,在很大程度上解决了保护问题。本文代表了SQLIA和XSS攻击,这些技术与用于限制对日常生活中随之而来的数据库,云和飞基站的不道德访问的几种机制进行了比较,以及获得它们所面临的挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Comparing the Access Control Mechanism in Database, Cloud and Femtocells
Security has been a major issue since the evolution of mankind. Access control refers to providing access to data only to specified users. In the present time, various mechanisms are used and many policies have been implemented to secure the confidential data. These mechanisms are not always easy to be implemented. Many challenges are met during the execution and various devices have been designed in an ad-hoc fashion to meet the present day requirements. The deployment of these devices and methods in various fields has solved the protection issue to a large extent. This paper represents the SQLIA and XSS attacks, the techniques that are compared to few mechanisms used to restrict unethical access to database, cloud and femtocells that followed in day-to-day life, and the challenges met to obtain them.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信