A New Approach to Secure and Manage Load Balancing of the Distributed Database Using SQL Firewall
This paper is the current approach database security of organization need layers of security around their data, with each layer protecting a specific area. The current trend of security attack is targeting any valuable data stored in a database such as financial data and student mark, including data...
| Main Authors: | A., Fairuzullah, Noraziah, Ahmad, Wan Maseri, Wan Mohd, Herawan, Tutut |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Springer, Singapore
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/10717/ http://umpir.ump.edu.my/id/eprint/10717/7/A%20New%20Approach%20To%20Secure%20The%20Distributed.pdf |
Similar Items
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
by: A., Fairuzullah, et al.
Published: (2019)
by: A., Fairuzullah, et al.
Published: (2019)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
RMF: Rough Set Membership Function-based for Clustering Web Transactions
by: Herawan, Tutut, et al.
Published: (2013)
by: Herawan, Tutut, et al.
Published: (2013)
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Data Security Analysis with Advanced Firewall Filtering at PT PUSRI
by: Misinem, ., et al.
Published: (2024)
by: Misinem, ., et al.
Published: (2024)
Firewalls offer stronger defences
Published: (2008)
Published: (2008)
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
by: Zailani, Abdullah, et al.
Published: (2012)
by: Zailani, Abdullah, et al.
Published: (2012)
Overview Between Clustering and Load Balancing
by: Abdulla Fairuzullah, Ahmad Tajuddin, et al.
Published: (2017)
by: Abdulla Fairuzullah, Ahmad Tajuddin, et al.
Published: (2017)
Comparison of security testing approaches for detection of SQL injection vulnerabilities
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
by: Mohammed Draib, Najla’a Ateeq, et al.
Published: (2018)
Review of SQL injection : problems and prevention
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
by: Mohd Yunus, Mohd Amin, et al.
Published: (2018)
Firewall Redundancy Rules Filtering Using Integrity Rules Checking
by: Zarina, Dzolkhifli, et al.
Published: (2018)
by: Zarina, Dzolkhifli, et al.
Published: (2018)
EFP-M2: Efficient model for mining frequent patterns in transactional database
by: Herawan, Tutut, et al.
Published: (2012)
by: Herawan, Tutut, et al.
Published: (2012)
Performance comparison between NoSQL (RethinkDB) and MySQL database replication from master to slave in big data
by: Dildar Hussain,, et al.
Published: (2021)
by: Dildar Hussain,, et al.
Published: (2021)
Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Applying Variable Precision Rough Set for Clustering Diabetics Dataset
by: Herawan, Tutut, et al.
Published: (2014)
by: Herawan, Tutut, et al.
Published: (2014)
Detecting Critical Least Association Rules In Medical Databases
by: Herawan, Tutut
Published: (2010)
by: Herawan, Tutut
Published: (2010)
Max-D clustering K-means algorithm for Autogeneration of Centroids and Distance of Data Points Cluster
by: Wan Maseri, Wan Mohd, et al.
by: Wan Maseri, Wan Mohd, et al.
MaxD K-Means: A clustering algorithm for auto-generation of centroids and distance of data points in clusters
by: Wan Maseri, Wan Mohd, et al.
Published: (2012)
by: Wan Maseri, Wan Mohd, et al.
Published: (2012)
Fragmentation techniques for ideal performance in distributed database - a survey
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2020)
by: Sharifah Hafizah, Syed Ahmad Ubaidillah, et al.
Published: (2020)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
Bandwidth Management for Intranets Using Multicast Firewalls
by: Tat, Chee Wan, et al.
Published: (2000)
by: Tat, Chee Wan, et al.
Published: (2000)
Verification the performance of Microsoft SQL Server / Nageswary Gannapathy
by: Nageswary , Gannapathy
Published: (2002)
by: Nageswary , Gannapathy
Published: (2002)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Mining significant association rules from educational data using critical relative support approach
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
A novel binary vote assignment grid quorum algorithm for distributed database fragmentation
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
by: Ainul Azila, Che Fauzi, et al.
Published: (2011)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
'One year to get immunity firewall'
by: Babulal, Veena
Published: (2021)
by: Babulal, Veena
Published: (2021)
Java TCP Server Load Balancer: Analysis And Comparison Of Its Load Balancing Algorithms
by: Abu Yan, Mohd Khir
Published: (2008)
by: Abu Yan, Mohd Khir
Published: (2008)
Evolutionary Grammars Based Design Framework For Product Innovation
by: Cheong Lee, Ho, et al.
Published: (2012)
by: Cheong Lee, Ho, et al.
Published: (2012)
The Backbone of Key Successful Branding Strategies in the 21st Century: Innovation in Design Technology, Decision Making on Product Quality, and Collaborative Communications
by: Ho, Cheong Lee, et al.
Published: (2017)
by: Ho, Cheong Lee, et al.
Published: (2017)
Product Design Generation and Decision Making Through Strategic Integration of Evolutionary Grammars and Kano Model
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
Big data science issues in distributed database
by: Kasim, Shahreen, et al.
Published: (2018)
by: Kasim, Shahreen, et al.
Published: (2018)
Improved Parameterless K-Means: Auto-Generation Centroids and Distance Data Point Clusters
by: Wan Maseri, Wan Mohd, et al.
Published: (2011)
by: Wan Maseri, Wan Mohd, et al.
Published: (2011)
Taxonomy of SQL Injection: ML Trends & Open Challenges
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
by: Abobakr Busaeed, Raed Abdullah, et al.
Published: (2023)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Web application firewall / Mohd Ikram Rahimi
by: Rahimi, Mohd Ikram
Published: (2006)
by: Rahimi, Mohd Ikram
Published: (2006)
A study of web application firewall solutions
by: Prandl, S., et al.
Published: (2015)
by: Prandl, S., et al.
Published: (2015)
Similar Items
-
Optimize performance load balancing techniques using binary vote assignment grid quorum (BVAGQ): A systematic review
by: A., Fairuzullah, et al.
Published: (2019) -
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005) -
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018) -
RMF: Rough Set Membership Function-based for Clustering Web Transactions
by: Herawan, Tutut, et al.
Published: (2013) -
LogiQL and SQL
by: Halpin, Terry, et al.
Published: (2015)