Data Integrity And Availability Techniques

1743 Words7 Pages
Abstract For many computing systems, database technologies are an essential component. They permit data to be reserved and shared electronically and the quantity of data retained in these systems continually develops at an exponential rate. As organizations upsurge their dependence on, possibly distributed, systems of information for daily business, they develop the vulnerability to security breaches even as they get efficiency and productivity advantages. However, numerous techniques like encryption and electronic signatures, are presently available for data protection whenever transmitted across the sites, an actually comprehensive tactic to protect data must also contain mechanisms to enforce access control policies centered on data contents, characteristics and subject qualifications, and other relevant appropriate information, like time. It is currently well recognized that the semantics of data has to be taken into consideration so as to stipulate effective policies of access control. Moreover, data integrity and availability techniques must be adopted that specially tailored to database systems. In this regard, for many years, the community for database security has developed various different techniques and approaches which assure data privacy, integrity, and availability. However, in spite of such advancements, the database security zone faces numerous inventive challenges. The security concern evolution, the "disintermediation" of data access, novel computing
Get Access