Kadebu et al., 2014 - Google Patents
A security requirements perspective towards a secured nosql database environmentKadebu et al., 2014
View PDF- Document ID
- 2867241242618481232
- Author
- Kadebu P
- Mapanga I
- Publication year
- Publication venue
- International Conference of Advance Research and Innovation
External Links
Snippet
Security has been and still remains a very pertinent issue to consider in database management systems development especially those handling and storing large volumes of data. Most researches have focused on security at hardware level, Operating system level …
- 238000011161 development 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1471—Saving, restoring, recovering or retrying involving logging of persistent data for recovery
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8769605B2 (en) | System and method for dynamically enforcing security policies on electronic files | |
US7831570B2 (en) | Mandatory access control label security | |
US9049195B2 (en) | Cross-domain security for data vault | |
US7593942B2 (en) | Mandatory access control base | |
US7814075B2 (en) | Dynamic auditing | |
US7814076B2 (en) | Data vault | |
Viega | Building security requirements with CLASP | |
Al-Sayid et al. | Database security threats: A survey study | |
ACHAR et al. | Data security in cloud: A review | |
US10339325B2 (en) | Multi-level security model for securing access to encrypted private data | |
Kadebu et al. | A security requirements perspective towards a secured nosql database environment | |
Dakic et al. | Linux Security in Physical, Virtual, and Cloud Environments | |
Gupta et al. | Challenges and security issues of distributed databases | |
Nanda et al. | Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA, Sarbanes Oxley and the Gramm Leach Bliley Act GLB | |
Lad | Application and Data Security Patterns | |
Amer | Security of DBMSs | |
Haber et al. | Privileged Access Management (PAM) | |
Pan et al. | Analysis of Database Security | |
Shivakumara et al. | Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention | |
Chu | Apache hadoop: A review on security issues and solutions for hdfs: A deep dive into the security issues occur in hdfs structure, and the available technologies to protect it | |
Badaghaish et al. | Evaluating the Effectiveness of Database Security Processes and Methodologies | |
Myalapalli | An appraisal to overhaul database security configurations | |
Periasamy et al. | Guarding Against Data Breach | |
Almasaari | Securing Big Data systems, A cybersecurity management discussion | |
El Abbadi et al. | Prototype of security framework system under Big data challenges |