Return to Article Details Comparative Analysis of Database Security Assurance Models from Unauthorized Actions and Quantitative Assessment of Integrity Download Download PDF