What is it about?

Distributed Database, Proxy Database , Information Security, Network Security, and Database Structure Modifications Propagation.

Featured Image

Why is it important?

Distributed Database, Proxy Database , Information Security, Network Security, and Database Structure Modifications Propagation.

Perspectives

Distributed Database, Proxy Database , Information Security, Network Security, and Database Structure Modifications Propagation.

Mr Mohammad Ghulam Ali
Indian Institute of Technology Kharagpur

Read the Original

This page is a summary of: Adopting a Proxy Database to Prevent Direct Access to Distributed Transaction Databases Ensuring Information Security, Journal of Advances in Mathematics and Computer Science, May 2022, Sciencedomain International,
DOI: 10.9734/jamcs/2022/v37i330441.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page