##plugins.themes.academic_pro.article.main##
Abstract
the article examines the processes of ensuring the security of the database, the creation and research of the database of users of the protected corporate network, one of the important tasks in ensuring the security of the database of users of the corporate network is the provision of Information Integrity, models of ensuring security
Keywords
database
corporate network
privacy
##plugins.themes.academic_pro.article.details##
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Sadikov Sh.M. (2023). Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity. Texas Journal of Engineering and Technology, 23, 14–19. Retrieved from https://zienjournals.com/index.php/tjet/article/view/4289
References
- George S. Oreku “Database Security: Concepts, Approaches, and Challenges” 2014.
- William Stallings “Cryptography and Network Security: Principles and Practice” 2013
- David W. Chadwick “Secure Multi-Party Non-Repudiation Protocols and Applications” 2015
- Hassan A “Database Security and Auditing: Protecting Data Integrity and Accessibility” 2021
- Ravi S. Sandhu “Database Security and Integrity” 1994
- Alton Chung and Sheng-Uei Guan “Database Security: From Legacy Systems to Blockchain
- Technology” 2021
- John R. Vacca “Computer and Information Security Handbook” 2021