Embedded SQL inserts SQL statements into the host programming language and executes them at program run time. SQL injection is a known ...
Tópico(s): Cloud Data Security Solutions
2020 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Information and Systems
Mohammed Abdulridha Hussain, Zaid Alaa Hussien, Zaid Ameen Abduljabbar, Junchao Ma, Mustafa A. Al Sibahee, Sarah Abdulridha Hussain, Vincent Omollo Nyangaresi, Xianlong Jiao,
... information. Attack methods such as structured query language (SQL) injection insert malicious code within user input data requests to gain unauthorised access, and then the attacker targets a database to manipulate information. In this paper, we propose a prevention method against SQL injection attacks through cryptography and searchable encryption. The ...
Tópico(s): Security and Verification in Computing
2022 - Elsevier BV | Egyptian Informatics Journal
The abundance of Arabidopsis insert mutants portends the day when null alleles in every gene will be obtained. Once these are created, all plant scientists can become geneticists. However, this brief technical highlight of genetic concepts cautions against ascribing gene function based exclusively on phenotypic analysis of null alleles.
Tópico(s): Plant nutrient uptake and metabolism
2003 - Elsevier BV | Trends in Plant Science
Benjamin Delaware, Clément Pit-Claudel, Jason Gross, Adam Chlipala,
... synthesis of query structures -- abstract data types with SQL-like query and insert operations. Fiat includes a library for writing specifications of query structures in SQL-inspired notation, expressing operations over relations (tables) in ...
Tópico(s): Logic, Reasoning, and Knowledge
2015 - Association for Computing Machinery | ACM SIGPLAN Notices
Bernard Knoops, André Clippe, Cédric Bogard, K. Arsalane, Ruddy Wattiez, Cédric Hermans, Elee Duconseille, Paul Falmagne, Alfred Bernard,
... were allowed to hybridize to generate a DNA insert coding for SQL (containing also two stop codons and a BglII ... coding sequence of the GFP fused to the insert coding for SQL was ligated into the 5653-bpBstB1-AvrII restriction product of pcDNA3.1/CT-GFP-TOPO containing the insert coding for hAOEB166 and the 5′-coding sequence ...
Tópico(s): Glutathione Transferases and Polymorphisms
1999 - Elsevier BV | Journal of Biological Chemistry
Gülsüm Yiğit, Merve Arnavutoğlu,
... text fields in web applications and tries to insert malicious SQL statements into a legitimate query via the vulnerable user input.By doing so, the attacker can access, insert, modify, or delete critical information in a database ...
Tópico(s): Spam and Phishing Detection
2017 - | International Journal of Computer Theory and Engineering
... injection also slowly become the mainstream way. Attack SQL injection is to use the insert harmful character attack technology. The attacker using programmers to user input data legitimacy detection not strictly or not detection characteristics, deliberately in a different way from client submit special code to manipulate data, thus collection procedures and server information, obtain the desired information. This paper briefly introduces the concept of SOL injection attack and principle, and the realization process of SQL injection attack, and on this basis describes how ...
Tópico(s): Web Application Security Vulnerabilities
2011 - Elsevier BV | Procedia Engineering
Ahmed Abatal, Alaoui Khadija, Larbi Chrifi‐Alaoui, Mohamed Bahaj,
... functioning of RETRO framework, these algorithms will convert SQL queries like INSERT, UPDATE and DELETE to the equivalent queries SPARQL ...
Tópico(s): Advanced Database Systems and Queries
2017 - | International Journal of Computer Applications Technology and Research
Witold Litwin, Soror Sahri, Thomas Schwarz,
... cumbersome manual repartitioning that characterize current technology. SD-SQL Server re-partitions a table when an insert overflows existing segments. With the comfort of a single node SQL Server user, the SD-SQL Server user has ...
Tópico(s): Advanced Computational Techniques and Applications
2006 - Springer Science+Business Media | Lecture notes in computer science
... rules just as easily as they use standard SQL insert, update, and delete statements. Ontologies can act as ...
Tópico(s): Advanced Database Systems and Queries
2006 - IEEE Computer Society | IEEE Distributed Systems Online
... Attacks occur when an attacker is able to insert a series of SQL statements into a 'query' by manipulating user input ...
Tópico(s): Spam and Phishing Detection
2013 - | International Journal of Computer Applications
... database. This model also can execute the join SQL queries for insert, update and delete, which are not available in ...
Tópico(s): Distributed systems and fault tolerance
2022 - Indian Society for Education and Environment | Indian Journal of Science and Technology
... SELECT statements and test them against database Design SQL INSERT, UPDATE, and DELETE statements It inserts SQL queries into COBOL code and creates auxiliary code ...
Tópico(s): Data Stream Mining Techniques
2011 - Trans Tech Publications | Advanced materials research
A. H. Beg, A. Noraziah, Ahmed N. Abd Alla, Elrasheed Ismail Sultan, Noriyani Mohd Zin,
... that PLSR outstanding performs 88.5 % faster than SQL server for transactional insert.
Tópico(s): Advanced Data Storage Technologies
2011 - Springer Science+Business Media | Communications in computer and information science
Merve Baş Seyyar, Ferhat Özgür Çatak, Ensar Gül,
... data. In addition to web scan detections, we insert a rule set to detect SQL Injection and XSS attacks. Our approach has been ...
Tópico(s): Advanced Malware Detection Techniques
2017 - Elsevier BV | Applied Computing and Informatics
Carlos A. Paz Rocha, Erwin Rauch, Taavi Vaimel, Manuel A. Ruiz Garcia, Renato Vidoni,
... preprocessing, tracks the activities of the operator and inserts the processing times into a SQL table of the data storage module. This module ...
Tópico(s): Manufacturing Process and Optimization
2021 - Elsevier BV | Procedia CIRP
Gajanan Shinde, Sandhya Waghere,
... parameters to change the query's logic hacker insert some SQL character in SQL Statement.When request is produced ...
Tópico(s): Spam and Phishing Detection
2017 - Polskie Towarzystwo Informatyczne | Annals of Computer Science and Information Systems
Boon-Hee Kim, Jun Hwang, Youngchan Kim,
... to the database so they must use Embedded SQL or Server Side Include where developers must insert database code into VRML and XML code. That ...
Tópico(s): Robotics and Automated Systems
2002 - Springer Science+Business Media | Lecture notes in computer science
Grzegorz Dziewit, Jakub Korczyński, Maria Skublewska‐Paszkowska,
... Two research hypotheses have been put forward: "Microsoft SQL Server database system needs less time to execute INSERT and UPDATE queries than Oracle database" and "Oracle database system needs less time to execute DML queries with binary data than SQL Server"
Tópico(s): Advanced Computational Techniques and Applications
2018 - Lublin University of Technology | Journal of Computer Sciences Institute
... sites will be driven by a database backend. SQL injection attacks are so called because what attackers are attempting to do is to insert their own code into a pre-existing query (e.g. a product search). The aim is to get the application to perform an action that is unexpected and usually of benefit to the attacker. In this article the concepts of SQL injection are introduced, attack vectors will be explored, ...
Tópico(s): Network Security and Intrusion Detection
2006 - Elsevier BV | Network Security
Harish Dehariya, Piyush Kumar Shukla, Manish Ahirwar,
... are being a major problem for web applications.SQL injection Attack (SQLIA) is the most common type of vulnerability in which a malicious mind person is inserts its own crafted query as input for retrieving personal information about others sensitive users.In this paper, for detection and prevention of SQL injection attacks various techniques are described and perform ...
Tópico(s): Web Application Security Vulnerabilities
2016 - | International Journal of Wireless and Microwave Technologies
... user interface, but also channels HTTP requests to SQL to optimally retrieve or insert data, potentially establishing a bridge towards Cloud or ...
Tópico(s): Distributed and Parallel Computing Systems
2014 - American Institute of Physics | AIP conference proceedings
Harish Dehariya, Piyush Kumar, Manish Ahirwar,
... is necessary to maintain confidentiality from unauthorized access.SQL injection Attack (SQLIA) is the most common type of vulnerability in which crafted query is inserts as input for retrieving personal information about other users.In this paper, various detection and prevention techniques of SQL injection attacks are described and perform a comparison ...
Tópico(s): Cloud Data Security Solutions
2016 - | International Journal of Computer Applications
Yuan Ding, Yingbao Yang, Changbin Wu, Hua Shao, Hao Li,
... easily queried by using simple structured query language (SQL) statements. To verify the operations of the MDCTDM in the database, we describe a case of the insert operation. The case demonstrates that the operation can be implemented easily by SQL statements.
Tópico(s): Computational Geometry and Mesh Generation
2018 - Institute of Electrical and Electronics Engineers | IEEE Access
Canan Eren Atay, Abdullah Uz Tansel,
... bitemporal structured query language (BtSQL) statement into standard SQL statements. The BtSQL includes the select, insert, delete, and update statements of the SQL, extended for bitemporal relational databases. It supports bitemporal, ...
Tópico(s): Semantic Web and Ontologies
2014 - Scientific and Technological Research Council of Turkey (TUBITAK) | TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES
Tansel Dökeroğlu, Serkan Ozal, Murat Ali Bayır, Muhammet Serkan Cınar, Ahmet Coşar,
... overall performance of Hadoop Hive, an open source SQL-based data warehouse using MapReduce. SharedHive transforms a set of correlated HiveQL queries into a new set of insert queries that will produce all of the required ...
Tópico(s): Cloud Computing and Resource Management
2014 - Springer Nature | Journal of Cloud Computing Advances Systems and Applications
P. Bhuvaneshwari, A. Nagaraja Rao, T. Aditya Sai Srinivas, D. S. Jayalakshmi, Somula Ramasubbareddy, K. Govinda,
... enterprise business data model, a comparison of both SQL*Plus and Hive for some CRUD operations (Insert, Join, and Retrieve) are estimated. By the work presented in this paper, we conclude if performance is a key, then SQL*Plus is a right choice to use and ...
Tópico(s): Peer-to-Peer Network Technologies
2018 - Springer Nature | Advances in intelligent systems and computing
... The PHP framework encapsulated, common database operations are INSERT, UPDATE, DELETE and SELECT.Developers will not be required to consider the specific SQL statement syntax, just to call it the method ...
Tópico(s): Service-Oriented Architecture and Web Services
2011 - | International Journal of Computer Science and Information Technology
Carlos D. Barranco, Juan Miguel Medina, José Enrique Pons, Olga Pons,
... The module implements the mechanisms that overload the SQL sentences: Insert, Update, Delete and Select to allow fuzzy temporal ...
Tópico(s): Constraint Satisfaction and Optimization
2013 - Springer Science+Business Media | Lecture notes in computer science