Journal: Asian Journal Of Computer And Information Systems
ISSN Number:
0
Downloads
12
Views
Abstract
In this paper, we describe the different database architecture and security measures. The architecture of a database system is greatly influenced by the underlying computer system on which the database system runs. Database systems can be centralized, where one server machine executes operations on the database. Database systems can also be designed to exploit parallel computer architectures. Distributed databases span multiple geographically separated machines. Ensuring the security of databases is also a complex issue when discussing database architecture. The purpose of this paper is to highlight and identify the architectures of database systems running on server systems, which are used in centralized and client–server architectures and the security measures pertaining to database systems.
Otusile,O. IDOWU,S. AJAYI,A. .
(2014). Overview of Database Architecture and Security Measures- Attacks and Control Methods, 2
(), 14-14.
Otusile,O. IDOWU,S. AJAYI,A. .
"Overview of Database Architecture and Security Measures- Attacks and Control Methods" 2, no (), (2014):
14-14.
Otusile,O. and IDOWU,S. and AJAYI,A. and .
(2014). Overview of Database Architecture and Security Measures- Attacks and Control Methods, 2
(), pp14-14.
OtusileO, IDOWUS, AJAYIA, .
Overview of Database Architecture and Security Measures- Attacks and Control Methods. 2014, 2
():14-14.
Otusile,Oluwabukola ,
IDOWU,Sunday ,
and AJAYI,Adebowale
.
"Overview of Database Architecture and Security Measures- Attacks and Control Methods", 2 . (2014) :
14-14.
[1]
O.Oluwabukola I.Sunday & A.Adebowale ,
"Overview of Database Architecture and Security Measures- Attacks and Control Methods"
vol.2,
no.,
pp. 14-14,
2014.