Security, Privacy, and Trust in Modern Data Management 2007
DOI: 10.1007/978-3-540-69861-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Database Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0
1

Year Published

2011
2011
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 22 publications
0
7
0
1
Order By: Relevance
“…Data security solutions have to meet three core requirements: confidentiality (also referred to as secrecy), integrity and availability. Confidentiality refers to protection against unauthorized access, integrity ensures unauthorized and improper modification of the data, whereas availability focuses on avoiding unavailability of software and hardware, as well as recovery from errors (Bertino et al , 2007; Ferrari, 2009).…”
Section: Authorization and Access Control Requirementsmentioning
confidence: 99%
See 4 more Smart Citations
“…Data security solutions have to meet three core requirements: confidentiality (also referred to as secrecy), integrity and availability. Confidentiality refers to protection against unauthorized access, integrity ensures unauthorized and improper modification of the data, whereas availability focuses on avoiding unavailability of software and hardware, as well as recovery from errors (Bertino et al , 2007; Ferrari, 2009).…”
Section: Authorization and Access Control Requirementsmentioning
confidence: 99%
“…The granularity of these entities can be at the level of fields, attributes or data components, based on the model structure. Fine-grained access control is a fundamental requirement today (Bertino et al , 2007; Bertino and Sandhu, 2005; Colombo and Ferrari, 2019). However, new challenges emerge due to heterogeneous data in schema-free NoSQL datastores, where authorizations and their enforcement cannot rely on a known schema like in relational databases (Okman et al , 2011; Sahafizadeh and Nematbakhsh, 2015; Colombo and Ferrari, 2017, 2019; Sicari et al , 2022).…”
Section: Authorization and Access Control Requirementsmentioning
confidence: 99%
See 3 more Smart Citations