Mitigating Malicious Updates: Prevention of Insider Threat to Databases.
Harini RagavanBrajendra PandaPublished in: TrustCom/ISPA/IUCC (2013)
Keyphrases
- insider threat
- databases
- insider attacks
- malicious activities
- security architecture
- database
- data leakage prevention
- data streams
- database systems
- data analysis
- relational databases
- data model
- database applications
- critical infrastructure
- control system
- data integrity
- computer networks
- monitoring system
- data sets
- real time