Flat role based access control and encryption scheme for database security
Encryption is one way that can be used to secure database. In the use of encryption to secure database it is important to determine where the location of encryption to be performed. In database encryption, one location to perform the encryption is in application level, where the data has been produc...
à®®à¯à®´à¯ விளகà¯à®•à®®à¯
Saved in:
| தலைமை எழà¯à®¤à¯à®¤à®¾à®³à®°à¯: | |
|---|---|
| வடிவமà¯: | Thesis |
| வெளியீடபà¯à®ªà®Ÿà¯à®Ÿà®¤à¯: |
2013
|
| பகà¯à®¤à®¿à®•ளà¯: | |
| நிகழà¯à®¨à®¿à®²à¯ˆ அணà¯à®•லà¯: | http://eprints.utm.my/41635/ http://eprints.utm.my/41635/ |
| கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ளà¯: |
கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯ இணை
கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ள௠இலà¯à®²à¯ˆ, இநà¯à®¤ கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯à®²à¯ˆ à®®à¯à®¤à®²à®¿à®²à¯ பதிவ௠செயà¯à®¯à¯à®™à¯à®•ளà¯!
|
இநà¯à®¤ கரà¯à®¤à¯à®¤à¯ˆ à®®à¯à®¤à®²à®¿à®²à¯ விடà¯à®Ÿà¯à®šà¯à®šà¯†à®²à¯à®²à¯à®™à¯à®•ளà¯!