Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity

Authors

  • Sadikov Sh.M. Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi Associate professor

Keywords:

database, corporate network, privacy

Abstract

the article examines the processes of ensuring the security of the database, the creation and research of the database of users of the protected corporate network, one of the important tasks in ensuring the security of the database of users of the corporate network is the provision of Information Integrity, models of ensuring security

References

George S. Oreku “Database Security: Concepts, Approaches, and Challenges” 2014.

William Stallings “Cryptography and Network Security: Principles and Practice” 2013

David W. Chadwick “Secure Multi-Party Non-Repudiation Protocols and Applications” 2015

Hassan A “Database Security and Auditing: Protecting Data Integrity and Accessibility” 2021

Ravi S. Sandhu “Database Security and Integrity” 1994

Alton Chung and Sheng-Uei Guan “Database Security: From Legacy Systems to Blockchain

Technology” 2021

John R. Vacca “Computer and Information Security Handbook” 2021

Downloads

Published

2023-08-08

Issue

Section

Articles

How to Cite

Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity. (2023). Texas Journal of Engineering and Technology, 23, 14-19. https://zienjournals.com/index.php/tjet/article/view/4289