|
Showing 1 - 4 of
4 matches in All Departments
Since databases are the primary repositories of information for
today's organizations and governments, database security has become
critically important. Introducing the concept of multilevel
security in relational databases, this book provides a comparative
study of the various models that support multilevel security
policies in the relational database-illustrating the strengths and
weaknesses of each model. Multilevel Security for Relational
Databases covers multilevel database security concepts along with
many other multilevel database security models and techniques. It
presents a prototype that readers can implement as a tool for
conducting performance evaluations to compare multilevel secure
database models. The book supplies a complete view of an
encryption-based multilevel security database model that integrates
multilevel security for the relational database with a system that
encrypts each record with an encryption key according to its
security class level. This model will help you utilize an
encryption system as a second security layer over the multilevel
security layer for the database, reduce the multilevel database
size, and improve the response time of data retrieval from the
multilevel database. Considering instance-based multilevel database
security, the book covers relational database access controls and
examines concurrency control in multilevel database security
systems. It includes database encryption algorithms, simulation
programs, and Visual studio and Microsoft SQL Server code.
Presenting encryption algorithms with diverse characteristics,
Image Encryption: A Communication Perspective examines image
encryption algorithms for the purpose of secure wireless
communication. It considers two directions for image encryption:
permutation-based approaches and substitution-based approaches.
Covering the spectrum of image encryption principles and
techniques, the book compares image encryption with permutation-
and diffusion-based approaches. It explores number theory-based
encryption algorithms such as the Data Encryption Standard, the
Advanced Encryption Standard, and the RC6 algorithms. It not only
details the strength of various encryption algorithms, but also
describes their ability to work within the limitations of wireless
communication systems. Since some ciphers were not designed for
image encryption, the book explains how to modify these ciphers to
work for image encryption. It also provides instruction on how to
search for other approaches suitable for this task. To make this
work comprehensive, the authors explore communication concepts
concentrating on the orthogonal frequency division multiplexing
(OFDM) system and present a simplified model for the OFDM
communication system with its different implementations. Complete
with simulation experiments and MATLAB (R) codes for most of the
simulation experiments, this book will help you gain the
understanding required to select the encryption method that best
fulfills your application requirements.
Presenting encryption algorithms with diverse characteristics,
Image Encryption: A Communication Perspective examines image
encryption algorithms for the purpose of secure wireless
communication. It considers two directions for image encryption:
permutation-based approaches and substitution-based approaches.
Covering the spectrum of image encryption principles and
techniques, the book compares image encryption with permutation-
and diffusion-based approaches. It explores number theory-based
encryption algorithms such as the Data Encryption Standard, the
Advanced Encryption Standard, and the RC6 algorithms. It not only
details the strength of various encryption algorithms, but also
describes their ability to work within the limitations of wireless
communication systems. Since some ciphers were not designed for
image encryption, the book explains how to modify these ciphers to
work for image encryption. It also provides instruction on how to
search for other approaches suitable for this task. To make this
work comprehensive, the authors explore communication concepts
concentrating on the orthogonal frequency division multiplexing
(OFDM) system and present a simplified model for the OFDM
communication system with its different implementations. Complete
with simulation experiments and MATLAB (R) codes for most of the
simulation experiments, this book will help you gain the
understanding required to select the encryption method that best
fulfills your application requirements.
Since databases are the primary repositories of information for
today's organizations and governments, database security has become
critically important. Introducing the concept of multilevel
security in relational databases, this book provides a comparative
study of the various models that support multilevel security
policies in the relational database-illustrating the strengths and
weaknesses of each model. Multilevel Security for Relational
Databases covers multilevel database security concepts along with
many other multilevel database security models and techniques. It
presents a prototype that readers can implement as a tool for
conducting performance evaluations to compare multilevel secure
database models. The book supplies a complete view of an
encryption-based multilevel security database model that integrates
multilevel security for the relational database with a system that
encrypts each record with an encryption key according to its
security class level. This model will help you utilize an
encryption system as a second security layer over the multilevel
security layer for the database, reduce the multilevel database
size, and improve the response time of data retrieval from the
multilevel database. Considering instance-based multilevel database
security, the book covers relational database access controls and
examines concurrency control in multilevel database security
systems. It includes database encryption algorithms, simulation
programs, and Visual studio and Microsoft SQL Server code.
|
|