Strategy And Guidelines For Sheltering Database To Database Communication Through Database Links
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
The majority of organizations today prefer Oracle database systems to maintain their operational and transactional data. Multiple databases will be used for different fields of operation in an organization. There arise many scenarios where one database will need to access the data stored in another database. Database to database communication is enabled in Oracle database with the help of database links. Among the numerous database products, Oracle database is regarded as a highly secure database. But still it has a few security issues in certain areas, including database links. This presented paper makes an attempt to highlight these security weaknesses and compose plans and guidelines to handle the database link in various situations.
Authors and Affiliations
Rajesh M, Sumit Saseendran
Elimination Of Repeated Data Copies With Enhanced Security In Hcloud
Intending at economically solving the trouble of deduplication with discrepancy privileges in cloud computing we regard as a hybrid cloud structural design consisting of a public cloud and a private cloud. Dissimilar...
Top-Down Heuristics for Multi-Dimensional Partitioning To Satisfy Imprecision Bounds
Role-based Access Control (RBAC) agrees to important permissions on objects based on roles in an organization. An RBAC policy configuration is collected of a set of Users (U), a set of Roles (R), and a set of Permiss...
Efficient Defence System For Avoid Malware Propagation In Mobile Network
We investigate the problem of how to optimally distribute the content-based signatures of malware, which helps to detect the corresponding malware and disable further propagation, to minimize the number of infected n...
Homomorphic Token and Distributed Erasure-Code for cloud
Cloud users store their data in the cloud environment which is privileged by the service provider. Cloud users can access their cloud storage. Here we propose a flexible distributed storage integrity auditing mechani...
Achieving QOS Guarantee’s over IP Networks Using Differentiated Services
Now a day’s internet is providing the best service .different applications contains, that doesn’t differentiate among packets that may be having different performance requirement .this kind of occurs a problem for re...