Marn-Ling Shing

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
In a simplified secured database access model, privileged group and public group can access data with any distribution. In order to secure the database, the confidentiality policy must be applied. Often, the management of the database privacy is neglected because data integrity has a higher priority in an environment dealing with insensitive data. This(More)
—There are many possible threats in nowadays computer networks when they are connected to Internet. There are many different defense strategies against those threats. This paper proposes to use a mixed strategy among those defense strategies for unknown chances of threats occurrence based on the game theory approach. The results showed that the mixed(More)
  • 1