Security and privacy implications on database systems in big data era: A survey

GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …

[PDF][PDF] 大数据时代的个人隐私保护

张铁赢, 靳小龙, 程学旗 - Journal of Computer Research and …, 2015 - img2.whpd.sh.cn
摘要随着信息技术的发展, 以Web2. 0 技术为基础的博客, 微博, 社交网络等新兴服务和物联网以
前所未有的发展速度产生了类型繁多的数据, 而云计算为数据的存储提供了基础平台 …

Data security and privacy: Concepts, approaches, and research directions

E Bertino - 2016 IEEE 40th annual computer software and …, 2016 - ieeexplore.ieee.org
Data are today an asset more critical than ever for all organizations we may think of. Recent
advances and trends, such as sensor systems, IoT, cloud computing, and data analytics, are …

[图书][B] Computer security: principles and practice

W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers,
programmers, system managers, network managers, product marketing personnel, system …

Big data security and privacy

E Bertino, E Ferrari - A comprehensive guide through the Italian database …, 2017 - Springer
Recent technologies, such as IoT, social networks, cloud computing, and data analytics,
make today possible to collect huge amounts of data. However, for data to be used to their …

Sok: Cryptographically protected database search

B Fuller, M Varia, A Yerukhimovich… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Protected database search systems cryptographically isolate the roles of reading from,
writing to, and administering the database. This separation limits unnecessary administrator …

The influence of information and communication technology (ICT) on future foresight processes—Results from a Delphi survey

J Keller, HA von der Gracht - Technological Forecasting and Social …, 2014 - Elsevier
Abstract Information and communication technology (ICT) tools are increasingly being used
to implement foresight exercises. Until now, it has not been analyzed how this development …

Deploying and managing web services: issues, solutions, and directions

Q Yu, X Liu, A Bouguettaya, B Medjahed - The VLDB Journal, 2008 - Springer
Web services are expected to be the key technology in enabling the next installment of the
Web in the form of the Service Web. In this paradigm shift, Web services would be treated as …

[图书][B] Information security fundamentals

JA Blackley, TR Peltier, J Peltier - 2004 - taylorfrancis.com
Effective security rules and procedures do not exist for their own sake-they are put in place
to protect critical assets, thereby supporting overall business objectives. Recognizing …

A convolutional neural-based learning classifier system for detecting database intrusion via insider attack

SJ Bu, SB Cho - Information Sciences, 2020 - Elsevier
Role-based access control (RBAC) in databases provides a valuable level of abstraction to
promote security administration at the business enterprise level. With the capacity for …