Current Trends in Data Security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#1
24-09-2010, 03:41 PM



.ppt   current-trends.ppt (Size: 168 KB / Downloads: 129)


Current Trends in Data Security


presented by

Dan Suciu

Joint work with Gerome Miklau


abstract

Data Security is the science and study of methods of protecting data (...) from unauthorized disclosure and modification

Data Security = Confidentiality + Integrity
Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#2
17-08-2012, 03:50 PM

Current Trends in Data Security


.ppt   current-trends.ppt (Size: 168 KB / Downloads: 23)

Data Security

Dorothy Denning, 1982:
Data Security is the science and study of methods of protecting data (...) from unauthorized disclosure and modification
Data Security = Confidentiality + Integrity

Traditional Data Security

Security in SQL = Access control + Views
Security in statistical databases = Theory

Summary of SQL Security

Limitations:
No row level access control
Table creator owns the data: that’s unfair !
Most policies in middleware: slow, error prone:
SAP has 10**4 tables
GTE over 10**5 attributes
A brokerage house has 80,000 applications
A US government entity thinks that it has 350K
Today the database is not at the center of the policy administration universe

Latanya Sweeney’s Finding

In Massachusetts, the Group Insurance Commission (GIC) is responsible for purchasing health insurance for state employees
GIC has to publish the data:

Research Topics in Data Security

Rest of the talk:
Information Leakage
Privacy
Fine-grained access control
Data encryption
Secure shared computation
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 156 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,427 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 277 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 275 13-02-2015, 02:01 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 313 29-01-2015, 01:15 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 317 21-01-2015, 04:19 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 293 17-01-2015, 04:13 PM
Last Post: jaseelati
  emerging trends in e commerce ppt jaseelati 0 160 09-01-2015, 02:30 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 403 06-01-2015, 04:47 PM
Last Post: jaseelati
  emerging trends in e commerce ppt jaseelati 0 196 05-01-2015, 04:03 PM
Last Post: jaseelati