Database security: research and practice
Information Systems
Improving Data Quality in Practice: A Case Study in the Italian Public Administration
Distributed and Parallel Databases
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Lineage tracing for general data warehouse transformations
The VLDB Journal — The International Journal on Very Large Data Bases
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Security issues of wireless sensor networks in healthcare applications
BT Technology Journal
Security and privacy for multimedia database management systems
Multimedia Tools and Applications
An approach to engineering the requirements of data warehouses
Requirements Engineering
Information and Software Technology
An adaptive privacy management system for data repositories
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Hi-index | 0.00 |
Nowadays, storing the information is fundamental for the correct functioning of any organization. The critical factor is to guarantee the security of the stored data. In the traditional database systems the security requirements are limited to confidentiality, integrity, availability of the data and user authorization. The criticality of the database system and data repositories for modern business with the new requirements of law and governments, makes the development of new system architecture necessary which ensures sophisticated set of security services. In this paper we propose the database architecture that ensures the non-repudiation of the user queries and data warehouse actions. These security services are accomplished by means of the middleware layer in the data warehouse architecture.