TY - CHAP A1 - Kiyoshi Nagata ED1 - Christos Kalloniatis Y1 - 2012-05-30 PY - 2012 T1 - Construction of Effective Database System for Information Risk Mitigation N2 - Every day, more users access services and electronically transmit information which is usually disseminated over insecure networks and processed by websites and databases, which lack proper security protection mechanisms and tools. This may have an impact on both the users’ trust as well as the reputation of the system’s stakeholders. Designing and implementing security enhanced systems is of vital importance. Therefore, this book aims to present a number of innovative security enhanced applications. It is titled “Security Enhanced Applications for Information Systems” and includes 11 chapters. This book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments. BT - Security Enhanced Applications for Information Systems SP - Ch. 6 UR - https://doi.org/10.5772/38492 DO - 10.5772/38492 SN - PB - IntechOpen CY - Rijeka Y2 - 2021-08-03 ER -