You are here

Security Risks in Online Distributed Database Systems

Journal Name:

Publication Year:

Author Name
Abstract (2. Language): 
Maintaining data duality becomes an easier practice when using a DaaS because of the control provided by a single, managed interface to the data. The Data as a Service approach needs to be a consideration when analyzing the technical aspects of a Data Governance or Master Data Management program implementation. Business in these days of agile methodologies moves at a high velocity. Enterprises might not have the resources to fully manage the technical aspects of their data investment, like models and metadata. A DaaS interface can allow non-technical users to easily make minor structural changes to data or reports, quickly meeting business requirement changes
112
118

REFERENCES

References: 

Coy, .S. (2010) Implications of the Choice of Distributed Database Systems.In Proceedings IEEE Symposium on Research in Security and Privacy, pp. 260-272.
Reavies, J. (2010). Regulatory requirements demand security standards compliance. In Survey By IEEE and Cloud Security Alliance Details Importance And Urgency Of Cloud Computing Security
IJART- Vol-1, Issue-2, December, 2016 Available online at http://www.ijart.info/
IMPACT FACTOR- 1.625
118
Singh, 2016
@IJART-2016, All Rights Reserved
Standards.IEEE Press Release. IEEE Computer Society Press. pp. 29-30.
Zubi, S. (2010). On Distributed Database Security Aspects..ICMCS '09 International Conference on Multimedia Computing and Systems, 2009.
Coviello, A. (2010). Securing the Path to Virtualization and the Private Cloud from the Desktop to the Datacenter. In Proceedings of RSA 2010 Security Decoded Conference .International Conference on Computer Security. EMC-RSA, Inc. Boston, MA, 34-35.
Smith, B. (2010). Building Confidence in the Cloud. In A Proposal for Industry and Government Action for Europe to Reap the Benefits of Cloud Computing. International Conference on EU Digital Market. Microsoft Press. Seattle, WA, 11-20.
Hayes, B. (2008). The LDV Secure Relational DBMS Model. Communications of the ACM, pp. 9–11
Yuhanna, .N. (2008). Database-As-A-Service Explodes On The Scene. Forrester Research.
Hakan, .H. (2005).Providing Database as a Service.ACM Transactions on Database Systems. pp. 25-29.
Mehtrotra, .S. (2005).Encryption in relational database management systems.In Proc. Fourteenth Annual IFIP Working Conference on Databa Security. pp. 105-109

Thank you for copying data from http://www.arastirmax.com