Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity
Keywords:
database, corporate network, privacyAbstract
the article examines the processes of ensuring the security of the database, the creation and research of the database of users of the protected corporate network, one of the important tasks in ensuring the security of the database of users of the corporate network is the provision of Information Integrity, models of ensuring security
References
George S. Oreku “Database Security: Concepts, Approaches, and Challenges” 2014.
William Stallings “Cryptography and Network Security: Principles and Practice” 2013
David W. Chadwick “Secure Multi-Party Non-Repudiation Protocols and Applications” 2015
Hassan A “Database Security and Auditing: Protecting Data Integrity and Accessibility” 2021
Ravi S. Sandhu “Database Security and Integrity” 1994
Alton Chung and Sheng-Uei Guan “Database Security: From Legacy Systems to Blockchain
Technology” 2021
John R. Vacca “Computer and Information Security Handbook” 2021
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
User Rights
Under the Creative Commons Attribution-NonCommercial 4.0 International (CC-BY-NC), the author (s) and users are free to share (copy, distribute and transmit the contribution).
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.










