Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/9386
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Ram Manohar-
dc.date.accessioned2014-11-19T08:02:33Z-
dc.date.available2014-11-19T08:02:33Z-
dc.date.issued1996-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/9386-
dc.guideSingh, Kuldip-
dc.description.abstractIn Object Oriented representation something viewed as a unified entity , ie numbers, persons, cities, components and so on, can be represented as an Object. So the object paradigm provides a natural but powerful technique for dealing with a variety of complex systems. Object oriented concepts first surfaced in programming languages and interface design,.and now it have been utilized in a variety of database implementation. Since last twenty years , the object oriented model is in progress, and, various applications packages have been developed to suit some of applications requirements. The object oriented approach and its. potential have been realised, .—' to keep pace with technology and present scenario ( complex environment ) The basic aspects such as security, integrity and consistency are resolved by using object oriented model for. operating system, databases (centralised, distributed), real time application, image database, computer aided design, computer aided software engineering and multimedia application. The most important aspects such as reliability, availability and performance may be obtained by using object oriented approach. The maintainability, upgradability and portability are obtained with minimal amount of efforts and cost. In this report, we have designed and implemented object oriented database model in distributed environment to achieve effective security and privacy. The tools of cryptography engineering is used for authenticity and privacy to obtain reliable secured system, which meets the "Defence" operational requirements. To achieve this objective the ISO and CCITT standards,,used alongwith effective algorithm for commitment , concurrency , recovery and transaction. The ISO standard is implemented in layered fashion to achieve a U 4 reliable system in terms of operation, access, storage, communication and retrieval. The security levels are organised in a hierarchical fashion and it is equaly valid for distributed and centralized environment. The ISO standards ISO 8831, ISO 8832 (Transaction Access and Management services and protocols) involves ISO 8649/3, ISO 8650/3 ( Commitment Concurrency and Recovery ), and CCITT X.509 Rec. "Directory Authentication Framework". The object oriented model is used to achieve the better system performance, response, availability and reliability. The various implementation strategy is proposed for security and privacy in distributed object oriented database systems. The properties and behaviour of object oriented data model suits the natural environment and it is viewed that future database systems of various application would be based on object oriented data model.en_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.titleSECURITY AND PRIVACY IN DISTRIBUTED OBJECT ORIENTED DATABASE SYSTEMSen_US
dc.typeM.Tech Dessertationen_US
dc.accession.number247075en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECD247075.pdf4.69 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.