Develo** secure data warehouses with a UML extension

E Fernández-Medina, J Trujillo, R Villarroel… - Information Systems, 2007‏ - Elsevier
Data Warehouses (DWs), Multidimensional (MD) Databases, and On-Line Analytical
Processing Applications are used as a very powerful mechanism for discovering crucial …

Security issues in databases

S Imran, I Hyder - 2009 Second International Conference on …, 2009‏ - ieeexplore.ieee.org
Security models, developed for databases, differ in many aspects because they focus on
different features of the database security problem or because they make different …

Database security using encryption

P Singh, K Kaur - 2015 International Conference on Futuristic …, 2015‏ - ieeexplore.ieee.org
Security of Data is the most important task in today's world. Over the years various
encryption schemes have been developed in order to protect the database from various …

Dynamic inference control

J Staddon - Proceedings of the 8th ACM SIGMOD workshop on …, 2003‏ - dl.acm.org
An inference problem exists in a multilevel database if knowledge of some objects in the
database allows information with a higher security level to be inferred. Many such inferences …

Inference attacks and information security in databases

AA Poltavtsev, AR Khabarov, AO Selyankin - Automatic Control and …, 2020‏ - Springer
Security of modern data architectures implemented in relational DBMS's is analyzed. The
emphasis is placed on inference attacks, which are not prevented by traditional access …

Shield privacy Hippocratic security method for virtual community

G Skinner, E Chang, M McMahon… - … Annual Conference of …, 2004‏ - ieeexplore.ieee.org
Pearlman et al.,(2002) defines a virtual community as a large, multiinstitutional group of
individuals who use a set of rules, a policy, to specify how to share their resources. With …

Security management through overloading views

R Adamus, K Subieta - … International Conferences" On the Move to …, 2004‏ - Springer
The model of overloading views is a facility allowing the programmer to separate some kinds
of crosscutting concerns that occur during design, implementation and maintenance of …

DATABASE SECURITY AND STUDY OF DATA ENCRYPTION METHODS IN CLOUD STORAGE

Y Shcherbinina, B Martseniuk… - … , навігації та зв'язку …, 2020‏ - journals.nupp.edu.ua
Purpose of the article is discusses the importance of database encryption and makes an in
depth review of various encryption techniques. Security of Data is the most important task in …

[PDF][PDF] Credential purpose-based access control for personal data protection in web-based applications

NA Ghani - 2013‏ - eprints.utm.my
Web-based applications enable users to carry out their business transactions virtually at any
time and place whereby users are required to disclose almost all their personal information …

[كتاب][B] Anti-tamper databases: Querying encrypted databases

SS Chung - 2006‏ - search.proquest.com
With advances in mobile computing, web technologies, and powerful laptops, databases
with sensitive data can be physically retrieved by malicious users who can employ …