Develo** secure data warehouses with a UML extension
E Fernández-Medina, J Trujillo, R Villarroel… - Information Systems, 2007 - Elsevier
Data Warehouses (DWs), Multidimensional (MD) Databases, and On-Line Analytical
Processing Applications are used as a very powerful mechanism for discovering crucial …
Processing Applications are used as a very powerful mechanism for discovering crucial …
Security issues in databases
Security models, developed for databases, differ in many aspects because they focus on
different features of the database security problem or because they make different …
different features of the database security problem or because they make different …
Database security using encryption
P Singh, K Kaur - 2015 International Conference on Futuristic …, 2015 - ieeexplore.ieee.org
Security of Data is the most important task in today's world. Over the years various
encryption schemes have been developed in order to protect the database from various …
encryption schemes have been developed in order to protect the database from various …
Dynamic inference control
J Staddon - Proceedings of the 8th ACM SIGMOD workshop on …, 2003 - dl.acm.org
An inference problem exists in a multilevel database if knowledge of some objects in the
database allows information with a higher security level to be inferred. Many such inferences …
database allows information with a higher security level to be inferred. Many such inferences …
Inference attacks and information security in databases
AA Poltavtsev, AR Khabarov, AO Selyankin - Automatic Control and …, 2020 - Springer
Security of modern data architectures implemented in relational DBMS's is analyzed. The
emphasis is placed on inference attacks, which are not prevented by traditional access …
emphasis is placed on inference attacks, which are not prevented by traditional access …
Shield privacy Hippocratic security method for virtual community
G Skinner, E Chang, M McMahon… - … Annual Conference of …, 2004 - ieeexplore.ieee.org
Pearlman et al.,(2002) defines a virtual community as a large, multiinstitutional group of
individuals who use a set of rules, a policy, to specify how to share their resources. With …
individuals who use a set of rules, a policy, to specify how to share their resources. With …
Security management through overloading views
The model of overloading views is a facility allowing the programmer to separate some kinds
of crosscutting concerns that occur during design, implementation and maintenance of …
of crosscutting concerns that occur during design, implementation and maintenance of …
DATABASE SECURITY AND STUDY OF DATA ENCRYPTION METHODS IN CLOUD STORAGE
Y Shcherbinina, B Martseniuk… - … , навігації та зв'язку …, 2020 - journals.nupp.edu.ua
Purpose of the article is discusses the importance of database encryption and makes an in
depth review of various encryption techniques. Security of Data is the most important task in …
depth review of various encryption techniques. Security of Data is the most important task in …
[PDF][PDF] Credential purpose-based access control for personal data protection in web-based applications
NA Ghani - 2013 - eprints.utm.my
Web-based applications enable users to carry out their business transactions virtually at any
time and place whereby users are required to disclose almost all their personal information …
time and place whereby users are required to disclose almost all their personal information …
[كتاب][B] Anti-tamper databases: Querying encrypted databases
SS Chung - 2006 - search.proquest.com
With advances in mobile computing, web technologies, and powerful laptops, databases
with sensitive data can be physically retrieved by malicious users who can employ …
with sensitive data can be physically retrieved by malicious users who can employ …