[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kadebu et al., 2014 - Google Patents

A security requirements perspective towards a secured nosql database environment

Kadebu et al., 2014

View PDF
Document ID
2867241242618481232
Author
Kadebu P
Mapanga I
Publication year
Publication venue
International Conference of Advance Research and Innovation

External Links

Snippet

Security has been and still remains a very pertinent issue to consider in database management systems development especially those handling and storing large volumes of data. Most researches have focused on security at hardware level, Operating system level …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1471Saving, restoring, recovering or retrying involving logging of persistent data for recovery
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking

Similar Documents

Publication Publication Date Title
US8769605B2 (en) System and method for dynamically enforcing security policies on electronic files
US7831570B2 (en) Mandatory access control label security
US9049195B2 (en) Cross-domain security for data vault
US7593942B2 (en) Mandatory access control base
US7814075B2 (en) Dynamic auditing
US7814076B2 (en) Data vault
Viega Building security requirements with CLASP
Al-Sayid et al. Database security threats: A survey study
ACHAR et al. Data security in cloud: A review
US10339325B2 (en) Multi-level security model for securing access to encrypted private data
Kadebu et al. A security requirements perspective towards a secured nosql database environment
Dakic et al. Linux Security in Physical, Virtual, and Cloud Environments
Gupta et al. Challenges and security issues of distributed databases
Nanda et al. Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA, Sarbanes Oxley and the Gramm Leach Bliley Act GLB
Lad Application and Data Security Patterns
Amer Security of DBMSs
Haber et al. Privileged Access Management (PAM)
Pan et al. Analysis of Database Security
Shivakumara et al. Review Paper on Dynamic Mechanisms of Data Leakage Detection and Prevention
Chu Apache hadoop: A review on security issues and solutions for hdfs: A deep dive into the security issues occur in hdfs structure, and the available technologies to protect it
Badaghaish et al. Evaluating the Effectiveness of Database Security Processes and Methodologies
Myalapalli An appraisal to overhaul database security configurations
Periasamy et al. Guarding Against Data Breach
Almasaari Securing Big Data systems, A cybersecurity management discussion
El Abbadi et al. Prototype of security framework system under Big data challenges