Return to Article Details Securing Database by Using with Masking Method Download Download PDF