Efficient detection of unauthorized data modification in cloud databases.
Luca FerrettiFabio PierazziMichele ColajanniMirco MarchettiMarcello MissiroliPublished in: ISCC (2014)
Keyphrases
- databases
- data sets
- data retrieval
- data structure
- raw data
- data processing
- data sources
- training data
- statistical analysis
- data collection
- database
- high quality
- experimental data
- false positives
- data management
- distributed data
- image data
- data analysis
- sensitive information
- database systems
- database queries
- data quality
- computing resources
- data privacy
- sensor data
- synthetic data
- high dimensional data
- data mining techniques
- object detection
- data warehouse
- knowledge discovery
- end users