Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Managing malicious transactions in m...
~
Singh, Abhiruchi.
Linked to FindBook
Google Book
Amazon
博客來
Managing malicious transactions in mobile database systems.
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Managing malicious transactions in mobile database systems./
Author:
Singh, Abhiruchi.
Description:
67 p.
Notes:
Source: Masters Abstracts International, Volume: 51-05.
Contained By:
Masters Abstracts International51-05(E).
Subject:
Engineering, Computer. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1534969
ISBN:
9781267978493
Managing malicious transactions in mobile database systems.
Singh, Abhiruchi.
Managing malicious transactions in mobile database systems.
- 67 p.
Source: Masters Abstracts International, Volume: 51-05.
Thesis (M.S.)--University of Missouri - Kansas City, 2013.
Database security is one of the most important issues for any organization, especially for financial institutions such as banks. Protecting database from external threats is relatively easier and a number of effective security schemes are available to organizations. Unfortunately, this is not so in the case of threats from insiders. Existing security schemes for such threats are some variation of external schemes that are not able to provide desirable security level. As a result, still authorized users (insiders) manage to misuse their privileges for fulfilling their malicious intent. It is a fact that most external security breaches succeed mainly with the help of insiders. An example for an insider is the Enron scandal of 2001 which led to bankruptcy of Enron Corporation. The firm was widely regarded as one of the most innovative, fastest growing and best managed business in the United States. When Enron filed for bankruptcy its share prices fall from US$90 to $1 causing a loss of nearly $11 billion dollar to its stakeholders. Financial officers and executives misled outside investors, auditors and Enron's board of directors about corporation's net income and liabilities. These insiders kept reported income and reported cash flow up, asset value inflated and liabilities off the book to meet Wall Street expectations. Enron's $63.4 billion in assets made it the largest corporate bankruptcy in American history at that time.
ISBN: 9781267978493Subjects--Topical Terms:
1669061
Engineering, Computer.
Managing malicious transactions in mobile database systems.
LDR
:03155nam a2200313 4500
001
1966749
005
20141112075103.5
008
150210s2013 ||||||||||||||||| ||eng d
020
$a
9781267978493
035
$a
(MiAaPQ)AAI1534969
035
$a
AAI1534969
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Singh, Abhiruchi.
$3
2103616
245
1 0
$a
Managing malicious transactions in mobile database systems.
300
$a
67 p.
500
$a
Source: Masters Abstracts International, Volume: 51-05.
500
$a
Adviser: Vijay Kumar.
502
$a
Thesis (M.S.)--University of Missouri - Kansas City, 2013.
520
$a
Database security is one of the most important issues for any organization, especially for financial institutions such as banks. Protecting database from external threats is relatively easier and a number of effective security schemes are available to organizations. Unfortunately, this is not so in the case of threats from insiders. Existing security schemes for such threats are some variation of external schemes that are not able to provide desirable security level. As a result, still authorized users (insiders) manage to misuse their privileges for fulfilling their malicious intent. It is a fact that most external security breaches succeed mainly with the help of insiders. An example for an insider is the Enron scandal of 2001 which led to bankruptcy of Enron Corporation. The firm was widely regarded as one of the most innovative, fastest growing and best managed business in the United States. When Enron filed for bankruptcy its share prices fall from US$90 to $1 causing a loss of nearly $11 billion dollar to its stakeholders. Financial officers and executives misled outside investors, auditors and Enron's board of directors about corporation's net income and liabilities. These insiders kept reported income and reported cash flow up, asset value inflated and liabilities off the book to meet Wall Street expectations. Enron's $63.4 billion in assets made it the largest corporate bankruptcy in American history at that time.
520
$a
Existing security policies are inadequate to prevent the attacks from insiders. Current database protections mechanisms do not fully protect occurrence of these malicious transactions. These requires human intervention in some form or other to detect malicious transactions. In a database, a transaction can affect the execution of the subsequesnt transactions thereby spreading the damage and hence making the attack recovery more complex. The problem of malicious attack becomes more pronounced when we are dealing with mobile database systems.
520
$a
This thesis proposes a solution to mitigate insider attack by identifying such malicious transactions. It develops a formal framework for characterizing mobile transaction by identifying essential components like order of data access, order of operations and user profile.
590
$a
School code: 0134.
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Engineering, General.
$3
1020744
650
4
$a
Computer Science.
$3
626642
690
$a
0464
690
$a
0537
690
$a
0984
710
2
$a
University of Missouri - Kansas City.
$b
Electrical Engineering.
$3
2094095
773
0
$t
Masters Abstracts International
$g
51-05(E).
790
$a
0134
791
$a
M.S.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=1534969
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9261755
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login